{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:44:59Z","timestamp":1771703099432,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319990729","type":"print"},{"value":"9783319990736","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99073-6_26","type":"book-chapter","created":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T18:09:38Z","timestamp":1533924578000},"page":"533-554","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation"],"prefix":"10.1007","author":[{"given":"Ron","family":"Bitton","sequence":"first","affiliation":[]},{"given":"Tomer","family":"Gluck","sequence":"additional","affiliation":[]},{"given":"Orly","family":"Stan","sequence":"additional","affiliation":[]},{"given":"Masaki","family":"Inokuchi","sequence":"additional","affiliation":[]},{"given":"Yoshinobu","family":"Ohta","sequence":"additional","affiliation":[]},{"given":"Yoshiyuki","family":"Yamada","sequence":"additional","affiliation":[]},{"given":"Tomohiko","family":"Yagyu","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,8]]},"reference":[{"key":"26_CR1","unstructured":"Cyber security assessment of industrial control systems - a good practice guide. Technical report, Centre for the Protection of National Infrastructure, April 2011"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Alves, T., Das, R., Morris, T.: Virtualization of industrial control system testbeds for cybersecurity, pp. 10\u201314. ACM","DOI":"10.1145\/3018981.3018988"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Gao, H., Peng, Y., Dai, Z., Wang, T., Jia, K.: The design of ICS testbed based on emulation, physical, and simulation (EPS-ICS testbed). In: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 420\u2013423. IEEE (2013)","DOI":"10.1109\/IIH-MSP.2013.111"},{"issue":"5","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1016\/j.compeleceng.2012.06.015","volume":"38","author":"B Genge","year":"2012","unstructured":"Genge, B., Siaterlis, C., Fovino, I.N., Masera, M.: A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Comput. Electr. Eng. 38(5), 1146\u20131161 (2012)","journal-title":"Comput. Electr. Eng."},{"key":"26_CR5","unstructured":"Green, B., Lee, A., Antrobus, R., Roedig, U., Hutchison, D., Rashid, A.: Pains, gains and PLCs: ten lessons from building an industrial control systems testbed for security research. In: 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2017). USENIX Association, Vancouver (2017)"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-38756-7_4","volume-title":"Transdisciplinary Perspectives on Complex Systems","author":"M Grieves","year":"2017","unstructured":"Grieves, M., Vickers, J.: Digital twin: mitigating unpredictable, undesirable emergent behavior in complex systems. In: Kahlen, F.-J., Flumerfelt, S., Alves, A. (eds.) Transdisciplinary Perspectives on Complex Systems, pp. 85\u2013113. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-38756-7_4"},{"key":"26_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26502-5_2","volume-title":"A Survey of Industrial Control System Testbeds","author":"H Holm","year":"2015","unstructured":"Holm, H., Karresand, M., Vidstr\u00f6m, A., Westring, E.: A Survey of Industrial Control System Testbeds. Springer, Cham (2015)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Lemay, A., Fernandez, J., Knight, S.: An isolated virtual cluster for SCADA network security research. In: Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research, p. 88 (2013)","DOI":"10.14236\/ewic\/ICSCSR2013.10"},{"key":"26_CR9","unstructured":"Leszczyna, R., Egozcue, E., Tarrafeta, L., Villar, V.F., Estremera, R., Alonso, J.: Protecting industrial control systems-recommendations for Europe and member states. Technical report (2011)"},{"key":"26_CR10","volume-title":"Nonlinear Integer Programming","author":"D Li","year":"2006","unstructured":"Li, D., Sun, X.: Nonlinear Integer Programming, vol. 84. Springer, Cham (2006)"},{"issue":"5","key":"26_CR11","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/JPROC.2015.2512235","volume":"104","author":"S McLaughlin","year":"2016","unstructured":"McLaughlin, S., Konstantinou, C., Wang, X., Davi, L., Sadeghi, A.-R., Maniatakos, M., Karri, R.: The cybersecurity landscape in industrial control systems. Proc. IEEE 104(5), 1039\u20131057 (2016)","journal-title":"Proc. IEEE"},{"issue":"4","key":"26_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2542049","volume":"46","author":"R Mitchell","year":"2014","unstructured":"Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"26_CR13","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10589-008-9218-1","volume":"47","author":"W Murray","year":"2010","unstructured":"Murray, W., Ng, K.-M.: An algorithm for nonlinear optimization problems with binary variables. Comput. Optim. Appl. 47(2), 257\u2013288 (2010)","journal-title":"Comput. Optim. Appl."},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.cose.2017.06.010","volume":"70","author":"S Nazir","year":"2017","unstructured":"Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70, 436\u2013454 (2017)","journal-title":"Comput. Secur."},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.17485\/ijst\/2017\/v10i26\/116775","volume":"10","author":"Q Qassim","year":"2017","unstructured":"Qassim, Q., et al.: A survey of SCADA testbed implementation approaches. Indian J. Sci. Technol. 10, 26 (2017)","journal-title":"Indian J. Sci. Technol."},{"key":"26_CR16","unstructured":"Searle, J.: NESCOR guide to penetration testing for electric utilities. Technical report, National Electric Sector Cybersecurity Organization Resource (NESCOR)"},{"issue":"6","key":"26_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/2602575","volume":"57","author":"C Siaterlis","year":"2014","unstructured":"Siaterlis, C., Genge, B.: Cyber-physical testbeds. Commun. ACM 57(6), 64\u201373 (2014)","journal-title":"Commun. ACM"},{"issue":"82","key":"26_CR18","first-page":"16","volume":"800","author":"K Stouffer","year":"2011","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Spec. Publ. 800(82), 16 (2011)","journal-title":"NIST Spec. Publ."}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99073-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T08:59:08Z","timestamp":1751792348000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99073-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319990729","9783319990736"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99073-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2018.upc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}