{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:27:32Z","timestamp":1762579652842,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032103468"},{"type":"electronic","value":"9783032103475"}],"license":[{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10347-5_13","type":"book-chapter","created":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:22:18Z","timestamp":1762579338000},"page":"138-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Digital Twins for\u00a0Proactive Ransomware Mitigation in\u00a0IoT Ecosystems"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"El-Hajj","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,9]]},"reference":[{"issue":"6","key":"13_CR1","doi-asserted-by":"publisher","first-page":"2767","DOI":"10.3390\/app11062767","volume":"11","author":"GP Agnusdei","year":"2021","unstructured":"Agnusdei, G.P., Elia, V., Gnoni, M.G.: Is digital twin technology supporting safety management? A bibliometric and systematic review. Appl. Sci. 11(6), 2767 (2021)","journal-title":"Appl. Sci."},{"issue":"20","key":"13_CR2","doi-asserted-by":"publisher","first-page":"3330","DOI":"10.3390\/electronics11203330","volume":"11","author":"E Altulaihan","year":"2022","unstructured":"Altulaihan, E., Almaiah, M.A., Aljughaiman, A.: Cybersecurity threats, countermeasures and mitigation techniques on the IoT: future research directions. Electronics 11(20), 3330 (2022)","journal-title":"Electronics"},{"key":"13_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2024.101889","volume":"99","author":"M Arazzi","year":"2024","unstructured":"Arazzi, M., Nicolazzo, S., Nocera, A.: A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation. Pervasive Mob. Comput. 99, 101889 (2024)","journal-title":"Pervasive Mob. Comput."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Batalov, E., Haverstock, P., Anderson, R., Thompson, W., Wolverton, R.: Ransomware detection via network traffic analysis using isolation forest and LSTM neural networks (2024)","DOI":"10.22541\/au.172928576.69686584\/v1"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Benmalek, M.: Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges. Internet of Things and Cyber-Physical Systems (2024)","DOI":"10.1016\/j.iotcps.2023.12.001"},{"key":"13_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103484","volume":"158","author":"B Bolat-Ak\u00e7a","year":"2024","unstructured":"Bolat-Ak\u00e7a, B., Bozkaya-Aras, E.: Digital twin-assisted intelligent anomaly detection system for Internet of Things. Ad Hoc Netw. 158, 103484 (2024)","journal-title":"Ad Hoc Netw."},{"key":"13_CR7","unstructured":"for Cybersecurity, C.I.: CIC-IoT 2023 dataset (2023). https:\/\/www.unb.ca\/cic\/datasets\/iot-2023.html"},{"issue":"19","key":"13_CR8","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.3390\/electronics13193941","volume":"13","author":"M El-Hajj","year":"2024","unstructured":"El-Hajj, M.: Leveraging digital twins and intrusion detection systems for enhanced security in IoT-based smart city infrastructures. Electronics 13(19), 3941 (2024)","journal-title":"Electronics"},{"issue":"5","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s19051141","volume":"19","author":"M El-Hajj","year":"2019","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of Internet of Things (IoT) authentication schemes. Sensors 19(5), 1141 (2019)","journal-title":"Sensors"},{"key":"13_CR10","unstructured":"El-Hajj, M., It\u00e4pelto, T., Gebremariam, T.: Systematic literature review: Digital twins\u2019 role in enhancing security for industry 4.0 applications. Security and Privacy, p.\u00a0e396"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Garalov, T., Elhajj, M.: Enhancing IoT security: design and evaluation of a raspberry pi-based intrusion detection system. In: 2023 International Symposium on Networks, Computers and Communications (ISNCC), pp.\u00a01\u20137. IEEE (2023)","DOI":"10.1109\/ISNCC58260.2023.10323656"},{"key":"13_CR12","unstructured":"Grieves, M.: Digital Twin: Manufacturing Excellence through Virtual Factory Replication. Michael Grieves LLC (2014)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Holmes, D., Papathanasaki, M., Maglaras, L., Ferrag, M.A., Nepal, S., Janicke, H.: Digital twins and cyber security\u2013solution or challenge? In: 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/SEEDA-CECNSM53056.2021.9566277"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"It\u00e4pelto, T.: Digital twin enhanced critical infrastructure life cycle security. In: 2023 IEEE Smart World Congress (SWC), pp.\u00a01\u20133. IEEE (2023)","DOI":"10.1109\/SWC57546.2023.10448804"},{"issue":"2","key":"13_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.18559\/ebr.2019.2.2","volume":"5","author":"P Lis","year":"2019","unstructured":"Lis, P., Mendel, J.: Cyberattacks on critical infrastructure: an economic perspective. Econ. Bus. Rev. 5(2), 24\u201347 (2019)","journal-title":"Econ. Bus. Rev."},{"key":"13_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2020.103277","volume":"118","author":"Q Lu","year":"2020","unstructured":"Lu, Q., Xie, X., Parlikad, A.K., Schooling, J.M.: Digital twin-enabled anomaly detection for built asset monitoring in operation and maintenance. Autom. Constr. 118, 103277 (2020)","journal-title":"Autom. Constr."},{"issue":"1","key":"13_CR17","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s11517-023-02912-0","volume":"62","author":"CM Mej\u00eda-Granda","year":"2024","unstructured":"Mej\u00eda-Granda, C.M., Fern\u00e1ndez-Alem\u00e1n, J.L., Carrillo-de Gea, J.M., Garc\u00eda-Bern\u00e1, J.A.: Security vulnerabilities in healthcare: an analysis of medical devices and software. Med. Biol. Eng. Comput. 62(1), 257\u2013273 (2024)","journal-title":"Med. Biol. Eng. Comput."},{"issue":"6","key":"13_CR18","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.vrih.2022.07.005","volume":"4","author":"AP Plageras","year":"2022","unstructured":"Plageras, A.P., Psannis, K.E.: Digital twins and multi-access edge computing for IIoT. Virtual Reality Intell. Hardware 4(6), 521\u2013534 (2022)","journal-title":"Virtual Reality Intell. Hardware"},{"issue":"5","key":"13_CR19","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s13198-023-02017-9","volume":"15","author":"KS Sangher","year":"2024","unstructured":"Sangher, K.S., Singh, A., Pandey, H.M.: Signature based ransomware detection based on optimizations approaches using randomclassifier and CNN algorithms. Int. J. Syst. Assur. Eng. Manag. 15(5), 1687\u20131703 (2024)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"13_CR20","unstructured":"Security, I.: Cost of a data breach report 2023 (2024). https:\/\/www.ibm.com\/reports\/data-breach. Accessed 01 Dec 2024"},{"issue":"8","key":"13_CR21","doi-asserted-by":"publisher","first-page":"9801","DOI":"10.1007\/s13369-021-06348-2","volume":"47","author":"A Singh","year":"2022","unstructured":"Singh, A., Satapathy, S.C., Roy, A., Gutub, A.: Ai-based mobile edge computing for IoT: applications, challenges, and future scope. Arab. J. Sci. Eng. 47(8), 9801\u20139831 (2022)","journal-title":"Arab. J. Sci. Eng."},{"key":"13_CR22","unstructured":"Team, F.I.L.: Large-scale IoT traffic traces (2022). https:\/\/www.iot-lab.info\/"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"van\u00a0der Wal, E.W., El-Hajj, M.: Securing networks of IoT devices with digital twins and automated adversary emulation. In: 2022 26th International Computer Science and Engineering Conference (ICSEC), pp. 241\u2013246. IEEE (2022)","DOI":"10.1109\/ICSEC56337.2022.10049355"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Yaqoob, I., et al.: The rise of ransomware and emerging security challenges in the Internet of Things. Comput. Netw. 129, 444\u2013458 (2017)","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"71907","DOI":"10.1109\/ACCESS.2019.2919760","volume":"7","author":"K Zandberg","year":"2019","unstructured":"Zandberg, K., Schleiser, K., Acosta, F., Tschofenig, H., Baccelli, E.: Secure firmware updates for constrained IoT devices using open standards: a reality check. IEEE Access 7, 71907\u201371920 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band and Wireless Computing, Communication and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10347-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:22:33Z","timestamp":1762579353000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10347-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,9]]},"ISBN":["9783032103468","9783032103475"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10347-5_13","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025,11,9]]},"assertion":[{"value":"9 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sharjah","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/bwcca\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}