{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T06:55:05Z","timestamp":1776236105728,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"vor","delay-in-days":2,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"NTNU Norwegian University of Science and Technology"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Threat modeling is a critical proactive security technique for identifying threats and determining mitigations. However, traditional approaches often fall short for Industrial Control Systems (ICS), which automate operations in domains like manufacturing and energy and are a subset of Cyber-Physical Systems (CPS). CPS integrates computation, networking, and physical processes, with ICS requiring specialized cybersecurity approaches due to its operational and safety-critical nature. This study explores the use of digital twin technology as a promising cybersecurity tool for ICS, enabling testing and analysis without disrupting operations. By examining the capabilities of digital twins in analysis, simulation, and replication, the research evaluates their potential to enhance threat modeling across the CPS life-cycle. Insights from the European Cyber Security Organisation (ECSO) Technical Paper on Cybersecurity Scenarios and Digital Twins guide the exploration of their role in threat modeling. The study addresses four research questions: 1. What purposes do digital twins serve in cybersecurity? 2. What benefits do digital twins offer in cybersecurity? 3. How can digital twin technology be leveraged for threat modeling? 4. What advantages can the use of digital twins bring to threat modeling? Our findings reveal that digital twins enhance ICS threat modeling by enabling continuous, dynamic, and autonomous assessment, offering valuable insights for advancing cybersecurity strategies in ICS, CPS, and related domains.<\/jats:p>","DOI":"10.1007\/s10207-025-01043-x","type":"journal-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T07:00:27Z","timestamp":1748934027000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Leveraging digital twins for advanced threat modeling in cyber-physical systems cybersecurity"],"prefix":"10.1007","volume":"24","author":[{"given":"Gizem","family":"Erceylan","sequence":"first","affiliation":[]},{"given":"Aida","family":"Akbarzadeh","sequence":"additional","affiliation":[]},{"given":"Vasileios","family":"Gkioulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,3]]},"reference":[{"key":"1043_CR1","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10462-024-10805-3","volume":"57","author":"M Homaei","year":"2024","unstructured":"Homaei, M., Mogollon-Gutierrez, O., Sancho, J.C., Avila, M., Caro, A.: A review of digital twins and their application in cybersecurity based on artificial intelligence. Artificial Intelligence Review 57, 201 (2024)","journal-title":"Artificial Intelligence Review"},{"key":"1043_CR2","unstructured":"Empl, P., Pernul, G., Koch, D., Dietz, M.: \u201cDigital Twins in Security Operations: State of the Art and Future Perspectives,\u201d vol.\u00a01, no.\u00a01, (2024)"},{"key":"1043_CR3","doi-asserted-by":"crossref","unstructured":"Yigit, Y., Kinaci, O.\u00a0K., Duong, T.\u00a0Q., Canberk, B.: \u201cTwinPot: Digital Twin-assisted Honeypot for Cyber-Secure Smart Seaports,\u201d in  2023 IEEE International Conference on Communications Workshops (ICC Workshops), pp.\u00a0740\u2013745, May (2023)","DOI":"10.1109\/ICCWorkshops57953.2023.10283756"},{"key":"1043_CR4","doi-asserted-by":"crossref","unstructured":"Becue, A., Fourastier, Y., Praca, I., Savarit, A., Baron, C., Gradussofs, B., Pouille, E., Thomas, C.: \u201cCyberFactory#1 - Securing the industry 4.0 with cyber-ranges and digital twins,\u201d in  2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), pp.\u00a01\u20134, June (2018)","DOI":"10.1109\/WFCS.2018.8402377"},{"key":"1043_CR5","first-page":"52","volume":"9","author":"M Eckhart","year":"2019","unstructured":"Eckhart, M., Brenner, B., Ekelhart, A., Weippl, E.: Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. Journal of Internet Services and Information Security 9, 52\u201373 (2019)","journal-title":"Journal of Internet Services and Information Security"},{"key":"1043_CR6","unstructured":"Allen, B.\u00a0D.: \u201cDigital Twins and Living Models at NASA,\u201d (2021)"},{"key":"1043_CR7","doi-asserted-by":"crossref","unstructured":"Grieves, M., Vickers, J.: \u201cDigital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems,\u201d in  Transdisciplinary Perspectives on Complex Systems (F.-J. Kahlen, S.\u00a0Flumerfelt, and A.\u00a0Alves, eds.), pp.\u00a085\u2013113, Cham: Springer International Publishing, (2017)","DOI":"10.1007\/978-3-319-38756-7_4"},{"key":"1043_CR8","doi-asserted-by":"crossref","unstructured":"Glaessgen, E., Stargel, D.: \u201cThe Digital Twin Paradigm for Future NASA and U.S. Air Force Vehicles,\u201d in  53rd AIAA\/ASME\/ASCE\/AHS\/ASC Structures, Structural Dynamics and Materials Conference20th AIAA\/ASME\/AHS Adaptive Structures Conference14th AIAA, (Honolulu, Hawaii), American Institute of Aeronautics and Astronautics, Apr. (2012)","DOI":"10.2514\/6.2012-1818"},{"key":"1043_CR9","doi-asserted-by":"crossref","unstructured":"Kritzinger, W., Karner, M., Traar, G., Henjes, J., Sihn, W.: \u201cDigital Twin in manufacturing: A categorical literature review and classification,\u201d in  IFAC-PapersOnLine, vol.\u00a051, pp.\u00a01016\u20131022, Elsevier B.V., Jan. (2018)","DOI":"10.1016\/j.ifacol.2018.08.474"},{"key":"1043_CR10","doi-asserted-by":"publisher","first-page":"5727","DOI":"10.3390\/app12115727","volume":"12","author":"M Singh","year":"2022","unstructured":"Singh, M., Srivastava, R., Fuenmayor, E., Kuts, V., Qiao, Y., Murray, N., Devine, D.: Applications of Digital Twin across Industries: A Review. Applied Sciences 12, 5727 (2022)","journal-title":"Applied Sciences"},{"key":"1043_CR11","unstructured":"\u201cAn Expert\u2019s Guide to Using Virtual or Digital Twins.\u201d"},{"key":"1043_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSEC.2019.2961650","volume":"18","author":"M Dietz","year":"2020","unstructured":"Dietz, M., Pernul, G.: Unleashing the Digital Twin\u2019s Potential for ICS Security. IEEE Security and Privacy 18, 20\u201327 (2020)","journal-title":"IEEE Security and Privacy"},{"key":"1043_CR13","doi-asserted-by":"crossref","unstructured":"Josifovska, K., Yigitbas, E., Engels, G.: \u201cReference Framework for Digital Twins within Cyber-Physical Systems,\u201d in  2019 IEEE\/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), pp.\u00a025\u201331, May (2019)","DOI":"10.1109\/SEsCPS.2019.00012"},{"key":"1043_CR14","doi-asserted-by":"crossref","unstructured":"Alcaraz, C., Lopez, J.: \u201cDigital Twin: A Comprehensive Survey of Security Threats,\u201d  IEEE Communications Surveys and Tutorials, vol.\u00a024, no.\u00a03, (2022)","DOI":"10.1109\/COMST.2022.3171465"},{"key":"1043_CR15","doi-asserted-by":"crossref","unstructured":"Lin, Y.\u00a0Z., Shao, S., Rahman, M.\u00a0H., Shafae, M., Satam, P.: \u201cDT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems Security,\u201d in  2023 IEEE 14th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2023, pp.\u00a0200\u2013209, Institute of Electrical and Electronics Engineers Inc., (2023)","DOI":"10.1109\/UEMCON59035.2023.10316090"},{"key":"1043_CR16","doi-asserted-by":"crossref","unstructured":"Redelinghuys, A.\u00a0J., Basson, A.\u00a0H., Kruger, K.: \u201cA six-layer architecture for the digital twin: a manufacturing case study implementation,\u201d  Journal of Intelligent Manufacturing, vol.\u00a031, no.\u00a06, (2020)","DOI":"10.1007\/s10845-019-01516-6"},{"key":"1043_CR17","unstructured":"\u201cISO 23247-2:2021 - Automation systems and integration- Digital twin framework for manufacturing-Part 2: Reference architecture.\u201d https:\/\/www.iso.org\/standard\/78743.html, Accessed December (2024)"},{"key":"1043_CR18","doi-asserted-by":"crossref","unstructured":"Heluany, J., Gkioulos, V.: \u201cSurvey on Digital Twins: from concepts to applications,\u201d in  Proceedings of the 18th International Conference on Availability, Reliability and Security, (Benevento Italy), pp.\u00a01\u20138, ACM, Aug. (2023)","DOI":"10.1145\/3600160.3605070"},{"key":"1043_CR19","doi-asserted-by":"crossref","unstructured":"Faleiro, R., Pan, L., Pokhrel, S.\u00a0R., Doss, R.: \u201cDigital Twin for Cybersecurity: Towards Enhancing Cyber Resilience,\u201d in  Broadband Communications, Networks, and Systems (W.\u00a0Xiang, F.\u00a0Han, and T.\u00a0K. Phan, eds.), vol.\u00a0413, pp.\u00a057\u201376, Cham: Springer International Publishing, (2022)","DOI":"10.1007\/978-3-030-93479-8_4"},{"key":"1043_CR20","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MSEC.2023.3271225","volume":"21","author":"M Eckhart","year":"2023","unstructured":"Eckhart, M., Ekelhart, A., Allison, D., Almgren, M., Ceesay-Seitz, K., Janicke, H., Nadjm-Tehrani, S., Rashid, A., Yampolskiy, M.: Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Security and Privacy 21, 64\u201375 (2023)","journal-title":"IEEE Security and Privacy"},{"key":"1043_CR21","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.procir.2016.11.152","volume":"61","author":"THJ Uhlemann","year":"2017","unstructured":"Uhlemann, T.H.J., Lehmann, C., Steinhilper, R.: The Digital Twin: Realizing the Cyber-Physical Production System for Industry 4.0. Procedia CIRP 61, 335\u2013340 (2017)","journal-title":"Procedia CIRP"},{"key":"1043_CR22","doi-asserted-by":"crossref","unstructured":"Rubio, J.\u00a0E., Alcaraz, C., Roman, R., Lopez, J.: \u201cAnalysis of Intrusion Detection Systems in Industrial Ecosystems:,\u201d in  Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, (Madrid, Spain), pp.\u00a0116\u2013128, SCITEPRESS - Science and Technology Publications, (2017)","DOI":"10.5220\/0006426301160128"},{"key":"1043_CR23","doi-asserted-by":"crossref","unstructured":"Eckhart, M., Ekelhart, A.: \u201cDigital Twins for Cyber-Physical Systems Security: State of the Art and Outlook,\u201d in  Security and Quality in Cyber-Physical Systems Engineering, (2019)","DOI":"10.1007\/978-3-030-25312-7_14"},{"key":"1043_CR24","doi-asserted-by":"crossref","unstructured":"Holmes, D., Papathanasaki, M., Maglaras, L, Ferrag, M., Nepal, S., Janicke, H.: \u201cDigital Twins and Cyber Security - solution or challenge?,\u201d (2021)","DOI":"10.1109\/SEEDA-CECNSM53056.2021.9566277"},{"key":"1043_CR25","doi-asserted-by":"crossref","unstructured":"B\u00e9cue, A., Praddaude, M., Maia, E., Hogrel, N., Pra\u00e7a, I., Yaich, R.: \u201cDigital Twins for Enhanced Resilience: Aerospace Manufacturing Scenario,\u201d in  Advanced Information Systems Engineering Workshops (J.\u00a0Horkoff, E.\u00a0Serral, and J.\u00a0Zdravkovic, eds.), vol.\u00a0451, pp.\u00a0107\u2013118, Cham: Springer International Publishing, (2022)","DOI":"10.1007\/978-3-031-07478-3_9"},{"key":"1043_CR26","doi-asserted-by":"crossref","unstructured":"Eckhart, M., Ekelhart, A.: \u201cTowards Security-Aware Virtual Environments for Digital Twins,\u201d in  Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, CPSS \u201918, (New York, NY, USA), pp.\u00a061\u201372, Association for Computing Machinery, May (2018)","DOI":"10.1145\/3198458.3198464"},{"key":"1043_CR27","doi-asserted-by":"crossref","unstructured":"Eckhart, M., Ekelhart, A.: \u201cA Specification-based State Replication Approach for Digital Twins,\u201d in  Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, (Toronto Canada), pp.\u00a036\u201347, ACM, Jan. (2018)","DOI":"10.1145\/3264888.3264892"},{"key":"1043_CR28","doi-asserted-by":"crossref","unstructured":"Akbarian, F., Fitzgerald, E., Kihl, M.: \u201cIntrusion Detection in Digital Twins for Industrial Control Systems,\u201d in  2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), (Split, Croatia), pp.\u00a01\u20136, IEEE, Sept. (2020)","DOI":"10.23919\/SoftCOM50211.2020.9238162"},{"issue":"7","key":"1043_CR29","doi-asserted-by":"publisher","first-page":"4733","DOI":"10.1109\/TII.2020.3019788","volume":"17","author":"A Castellani","year":"2021","unstructured":"Castellani, A., Schmitt, S., Squartini, S., Member, S.: Real-World Anomaly Detection by Using Digital Twin Systems and Weakly Supervised Learning. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 17(7), 4733 (2021)","journal-title":"IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS"},{"key":"1043_CR30","doi-asserted-by":"crossref","unstructured":"Akbarian, F., T\u00e4rneberg, W., Fitzgerald, E., Kihl, M.: \u201cA Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation,\u201d in  2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ), pp.\u00a001\u201308, Sept. (2021)","DOI":"10.1109\/ETFA45728.2021.9613545"},{"key":"1043_CR31","doi-asserted-by":"crossref","unstructured":"Patel, A., Schenk, T., Knorn, S., Patzlaff, H., Obradovic, D., Halblaub, A.: \u201cReal-time, simulation-based identification of cyber-security attacks of industrial plants,\u201d pp.\u00a0267\u2013272, (2021)","DOI":"10.1109\/CSR51186.2021.9527938"},{"key":"1043_CR32","doi-asserted-by":"crossref","unstructured":"Fraser, B., Al-Rubaye, S., Aslam, S., Tsourdos, A.: \u201cEnhancing the Security of Unmanned Aerial Systems using Digital-Twin Technology and Intrusion Detection,\u201d vol.\u00a02021-October, (2021)","DOI":"10.1109\/DASC52595.2021.9594321"},{"key":"1043_CR33","doi-asserted-by":"crossref","unstructured":"Varghese, S.\u00a0A., Dehlaghi\u00a0Ghadim, A., Balador, A., Alimadadi, Z., Papadimitratos, P.: \u201cDigital Twin-based Intrusion Detection for Industrial Control Systems,\u201d in  2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022, (2022)","DOI":"10.1109\/PerComWorkshops53856.2022.9767492"},{"key":"1043_CR34","doi-asserted-by":"publisher","first-page":"3561","DOI":"10.1109\/JSAC.2023.3310091","volume":"41","author":"H Wang","year":"2023","unstructured":"Wang, H., Di, X., Wang, Y., Ren, B., Gao, G., Deng, J.: An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification. IEEE Journal on Selected Areas in Communications 41, 3561\u20133572 (2023)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1043_CR35","first-page":"1","volume":"32","author":"Q Xu","year":"2023","unstructured":"Xu, Q., Ali, S., Yue, T.: Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems. ACM Transactions on Software Engineering and Methodology 32, 1\u201332 (2023)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"1043_CR36","doi-asserted-by":"crossref","unstructured":"Akbarian, F., T\u00e4rneberg, W., Fitzgerald, E., Kihl, M.:\u201cDetecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins,\u201d in  2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), (Split, Croatia), pp.\u00a01\u20136, IEEE, Sept. (2023)","DOI":"10.23919\/SoftCOM58365.2023.10271648"},{"key":"1043_CR37","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1109\/TASE.2023.3243147","volume":"21","author":"EC Balta","year":"2024","unstructured":"Balta, E.C., Pease, M., Moyne, J., Barton, K., Tilbury, D.M.: Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems. IEEE Transactions on Automation Science and Engineering 21, 1695\u20131712 (2024)","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"key":"1043_CR38","doi-asserted-by":"crossref","unstructured":"Gaurav, A., Gupta, B.\u00a0B., Tai\u00a0Chui, K., Arya, V., Benkhelifa, E.: \u201cA DDoS Attack Detection System for Industry 5.0 using Digital Twins and Machine Learning,\u201d in  2023 IEEE 12th Global Conference on Consumer Electronics (GCCE), pp.\u00a01019\u20131022, Oct. (2023)","DOI":"10.1109\/GCCE59613.2023.10315663"},{"key":"1043_CR39","doi-asserted-by":"crossref","unstructured":"Thalpage, N.\u00a0S., Nisansala, T.\u00a0A.\u00a0D.: \u201cExploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing - A Systematic Review,\u201d in  Data Protection in a Post-Pandemic Society (C.\u00a0Hewage, Y.\u00a0Rahulamathavan, and D.\u00a0Ratnayake, eds.), pp.\u00a0113\u2013143, Cham: Springer International Publishing, (2023)","DOI":"10.1007\/978-3-031-34006-2_4"},{"key":"1043_CR40","doi-asserted-by":"crossref","unstructured":"Amorim\u00a0Reis, L.\u00a0H., Murillo\u00a0Piedrahita, A.\u00a0F., Rueda\u00a0Rodr\u00edguez, S.\u00a0J., Castro\u00a0Fernandes, N., Scherly Varela\u00a0de Medeiros, D., Dias\u00a0de Amorim, M., Ferrazani\u00a0Mattos, D.\u00a0M.: \u201cUnsupervised and Incremental Learning Orchestration for Cyber-Physical Security,\u201d  Transactions on emerging telecommunications technologies, vol.\u00a031, p.\u00a0e4011, July (2020)","DOI":"10.1002\/ett.4011"},{"key":"1043_CR41","doi-asserted-by":"crossref","unstructured":"Nintsiou, M., Grigoriou, E., Karypidis, P.\u00a0A., Saoulidis, T., Fountoukidis, E., Sarigiannidis, P.: \u201cThreat intelligence using Digital Twin honeypots in Cybersecurity,\u201d in  2023 IEEE International Conference on Cyber Security and Resilience (CSR), pp.\u00a0530\u2013537, July (2023)","DOI":"10.1109\/CSR57506.2023.10224997"},{"key":"1043_CR42","doi-asserted-by":"crossref","unstructured":"Shalaginov, A., Kotsiuba, I., Iqbal, A.:\u201cCybercrime Investigations in the Era of Smart Applications: Way Forward Through Big Data,\u201d in  2019 IEEE International Conference on Big Data (Big Data), pp.\u00a04309\u20134314, Dec. (2019)","DOI":"10.1109\/BigData47090.2019.9006596"},{"key":"1043_CR43","doi-asserted-by":"crossref","unstructured":"Dietz, M., Englbrecht, L., Pernul, G.: \u201cEnhancing Industrial Control System Forensics Using Replication-Based Digital Twins,\u201d in  Advances in Digital Forensics XVII (G.\u00a0Peterson and S.\u00a0Shenoi, eds.), vol.\u00a0612, pp.\u00a021\u201338, Cham: Springer International Publishing, (2021)","DOI":"10.1007\/978-3-030-88381-2_2"},{"key":"1043_CR44","doi-asserted-by":"crossref","unstructured":"Bitton, R., Gluck, T., Stan, O., Inokuchi, M., Ohta, Y., Yamada, Y., Yagyu, T., Elovici, Y., Shabtai, A.: \u201cDeriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation,\u201d in  Computer Security (J.\u00a0Lopez, J.\u00a0Zhou, and M.\u00a0Soriano, eds.), vol.\u00a011098, pp.\u00a0533\u2013554, Cham: Springer International Publishing, (2018)","DOI":"10.1007\/978-3-319-99073-6_26"},{"key":"1043_CR45","doi-asserted-by":"crossref","unstructured":"Semenkov, K., Promyslov, V., Poletykin, A.: \u201cVerification of Large Scale Control Systems with Hybrid Digital Models and Digital Twins,\u201d in  2020 International Russian Automation Conference (RusAutoCon), pp.\u00a0325\u2013329, Sept. (2020)","DOI":"10.1109\/RusAutoCon49822.2020.9208167"},{"key":"1043_CR46","doi-asserted-by":"crossref","unstructured":"Francia, G., Hall, G.:\u201cDigital Twins for Industrial Control Systems Security,\u201d in  2021 International Conference on Computational Science and Computational Intelligence (CSCI), pp.\u00a0801\u2013805, Dec. (2021)","DOI":"10.1109\/CSCI54926.2021.00029"},{"key":"1043_CR47","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/machines9030062","volume":"9","author":"K Semenkov","year":"2021","unstructured":"Semenkov, K., Promyslov, V., Poletykin, A., Mengazetdinov, N.: Validation of Complex Control Systems with Heterogeneous Digital Models in Industry 4.0 Framework. Machines 9, 62 (2021)","journal-title":"Machines"},{"key":"1043_CR48","doi-asserted-by":"publisher","first-page":"3143","DOI":"10.1007\/s00170-022-09475-8","volume":"121","author":"Z Liu","year":"2022","unstructured":"Liu, Z., Zhang, Q., Duan, J., Liu, D.: Digital twin-based testing process management for large and complex equipment components. The International Journal of Advanced Manufacturing Technology 121, 3143\u20133161 (2022)","journal-title":"The International Journal of Advanced Manufacturing Technology"},{"key":"1043_CR49","doi-asserted-by":"crossref","unstructured":"Dietz, M., Hageman, L., Von\u00a0Hornung, C., Pernul, G.: \u201cEmploying Digital Twins for Security-by-Design System Testing,\u201d in  Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, (Baltimore MD USA), pp.\u00a097\u2013106, ACM, Apr. (2022)","DOI":"10.1145\/3510547.3517929"},{"key":"1043_CR50","doi-asserted-by":"crossref","unstructured":"Sen, O., Bleser, N., Ulbig, A.: \u201cDigital Twin for Evaluating Detective Countermeasures in Smart Grid Cybersecurity,\u201d in  2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp.\u00a01\u20136, Oct. (2023)","DOI":"10.1109\/SmartGridComm57358.2023.10333871"},{"key":"1043_CR51","doi-asserted-by":"crossref","unstructured":"Heluany, J., Goetzfried, J., Mehlig, B., Gkioulos, V.:\u201cVulnerability management digital twin for energy systems,\u201d in  Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES \u201924, (New York, NY, USA), pp.\u00a01\u201311, Association for Computing Machinery, July (2024)","DOI":"10.1145\/3664476.3671013"},{"key":"1043_CR52","doi-asserted-by":"publisher","first-page":"134","DOI":"10.3390\/fi16040134","volume":"16","author":"Y Jiang","year":"2024","unstructured":"Jiang, Y., Wang, W., Ding, J., Lu, X., Jing, Y.: Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber-Physical Production Systems. Future Internet 16, 134 (2024)","journal-title":"Future Internet"},{"key":"1043_CR53","doi-asserted-by":"crossref","unstructured":"Vielberth, M., Glas, M., Dietz, M., Karagiannis, S., Magkos, E., Pernul, G.: \u201cA Digital Twin-Based Cyber Range for SOC Analysts,\u201d in  Data and Applications Security and Privacy XXXV (K.\u00a0Barker and K.\u00a0Ghazinour, eds.), vol.\u00a012840, pp.\u00a0293\u2013311, Cham: Springer International Publishing, (2021)","DOI":"10.1007\/978-3-030-81242-3_17"},{"key":"1043_CR54","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCE.2022.3203202","volume":"12","author":"H Zhou","year":"2023","unstructured":"Zhou, H., Li, M., Sun, Y., Yun, L., Tian, Z.: Digital Twin-Based Cyber Range for Industrial Internet of Things. IEEE Consumer Electronics Magazine 12, 66\u201377 (2023)","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"1043_CR55","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MSEC.2023.3281272","volume":"21","author":"AP Mathur","year":"2023","unstructured":"Mathur, A.P.: Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure. IEEE Security & Privacy 21, 51\u201360 (2023)","journal-title":"IEEE Security & Privacy"},{"key":"1043_CR56","doi-asserted-by":"crossref","unstructured":"Suhail, S., Iqbal, M., Hussain, R., Jurdak, R.: \u201cENIGMA: An explainable digital twin security solution for cyber-physical systems,\u201d  Computers in Industry, vol.\u00a0151, (2023)","DOI":"10.1016\/j.compind.2023.103961"},{"key":"1043_CR57","doi-asserted-by":"crossref","unstructured":"Mittal, S., Tolk, A., Pyles, A., Balen, N.\u00a0V., Bergollo, K.: \u201cDigital Twin Modeling, Co-Simulation and Cyber Use-Case Inclusion Methodology for IOT Systems,\u201d in  2019 Winter Simulation Conference (WSC), pp.\u00a02653\u20132664, Dec. (2019)","DOI":"10.1109\/WSC40007.2019.9004656"},{"key":"1043_CR58","doi-asserted-by":"publisher","first-page":"5138","DOI":"10.1109\/TSG.2020.3000958","volume":"11","author":"A Saad","year":"2020","unstructured":"Saad, A., Faddel, S., Youssef, T., Mohammed, O.A.: On the Implementation of IoT-Based Digital Twin for Networked Microgrids Resiliency Against Cyber Attacks. IEEE Transactions on Smart Grid 11, 5138\u20135150 (2020)","journal-title":"IEEE Transactions on Smart Grid"},{"key":"1043_CR59","doi-asserted-by":"publisher","first-page":"107574","DOI":"10.1109\/ACCESS.2021.3100708","volume":"9","author":"B Sousa","year":"2021","unstructured":"Sousa, B., Arieiro, M., Pereira, V., Correia, J., Louren\u00e7o, N., Cruz, T.: ELEGANT: Security of Critical Infrastructures With Digital Twins. IEEE Access 9, 107574\u2013107588 (2021)","journal-title":"IEEE Access"},{"key":"1043_CR60","doi-asserted-by":"crossref","unstructured":"Hadar, E., Kravchenko, D., Basovskiy, A.: \u201cCyber Digital Twin Simulator for Automatic Gathering and Prioritization of Security Controls\u2019 Requirements,\u201d in  2020 IEEE 28th International Requirements Engineering Conference (RE), pp.\u00a0250\u2013259, Aug. (2020)","DOI":"10.1109\/RE48521.2020.00035"},{"key":"1043_CR61","doi-asserted-by":"crossref","unstructured":"Hammar, K., Stadler, R.: \u201cDigital Twins for Security Automation,\u201d in  NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium, pp.\u00a01\u20136, May (2023)","DOI":"10.1109\/NOMS56928.2023.10154288"},{"key":"1043_CR62","doi-asserted-by":"crossref","unstructured":"Dietz, M., Vielberth, M., Pernul, G.: \u201cIntegrating digital twin security simulations in the security operations center,\u201d in  ACM International Conference Proceeding Series, (2020)","DOI":"10.1145\/3407023.3407039"},{"key":"1043_CR63","doi-asserted-by":"crossref","unstructured":"Empl, P., Schlette, D., Zupfer, D., Pernul, G.: \u201cSOAR4IoT: Securing IoT Assets with Digital Twins,\u201d in  Proceedings of the 17th International Conference on Availability, Reliability and Security, (Vienna Austria), pp.\u00a01\u201310, ACM, Aug. (2022)","DOI":"10.1145\/3538969.3538975"},{"key":"1043_CR64","doi-asserted-by":"crossref","unstructured":"Empl, P., Hager, H., Pernul, G.: \u201cDigital Twins for IoT Security Management,\u201d in  Data and Applications Security and Privacy XXXVII (V.\u00a0Atluri and A.\u00a0L. Ferrara, eds.), (Cham), pp.\u00a0141\u2013149, Springer Nature Switzerland, (2023)","DOI":"10.1007\/978-3-031-37586-6_9"},{"key":"1043_CR65","doi-asserted-by":"crossref","unstructured":"Allison, D., Smith, P., Mclaughlin, K.:\u201cDigital Twin-Enhanced Incident Response for Cyber-Physical Systems,\u201d in  Proceedings of the 18th International Conference on Availability, Reliability and Security, (Benevento Italy), pp.\u00a01\u201310, ACM, Aug. (2023)","DOI":"10.1145\/3600160.3600195"},{"key":"1043_CR66","doi-asserted-by":"publisher","first-page":"95","DOI":"10.3390\/info14020095","volume":"14","author":"P Empl","year":"2023","unstructured":"Empl, P., Pernul, G.: Digital-Twin-Based Security Analytics for the Internet of Things. Information 14, 95 (2023)","journal-title":"Information"},{"key":"1043_CR67","doi-asserted-by":"crossref","unstructured":"Eckhart, M., Ekelhart, A., Weippl, E.: \u201cEnhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins,\u201d in  2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (Zaragoza, Spain), pp.\u00a01222\u20131225, IEEE, Sept. (2019)","DOI":"10.1109\/ETFA.2019.8869197"},{"key":"1043_CR68","doi-asserted-by":"crossref","unstructured":"Heluany, J., Amro, A., Gkioulos, V., Katsikas, S.: \u201cInterplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements,\u201d in  Proceedings of the 2024 ACM\/IEEE 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) and 2024 IEEE\/ACM Second International Workshop on Software Vulnerability, (Lisbon Portugal), pp.\u00a020\u201328, ACM, Apr. (2024)","DOI":"10.1145\/3643662.3643955"},{"key":"1043_CR69","unstructured":"Ecso, Ecso, WG.: \u201cEuropean Cyber Security Organisation ECSO Technical Paper on Cybersecurity scenarios and Digital Twins,\u201d tech. rep., (2023)"},{"key":"1043_CR70","doi-asserted-by":"crossref","unstructured":"Naik, N., Jenkins, P., Grace, P., Naik, D., Prajapat, S., Song, J.: \u201cA comparative analysis of threat modelling methods: Stride, dread, vast, pasta, octave, and linddun,\u201d in  The International Conference on Computing, Communication, Cybersecurity & AI, pp.\u00a0271\u2013280, Springer, (2024)","DOI":"10.1007\/978-3-031-74443-3_16"},{"key":"1043_CR71","unstructured":"Shevchenko, N., Chick, T.\u00a0A., O\u2019Riordan, P., Scanlon, T.\u00a0P., Woody, C.: \u201cThreat Modeling: A Summary of Available Methods,\u201d  Software Engineering Institute| Carnegie Mellon University, (2018)"},{"key":"1043_CR72","unstructured":"MITRE ATT &CK Framework. https:\/\/attack.mitre.org\/. Accessed Dec 2024"},{"key":"1043_CR73","unstructured":"National Institute of Standards and Technology. Threat Modeling. https:\/\/csrc.nist.gov\/glossary\/term\/threat_modeling. Accessed Dec 2024"},{"key":"1043_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103611","volume":"137","author":"M Jbair","year":"2022","unstructured":"Jbair, M., Ahmad, B., Maple, C., Harrison, R.: Threat modelling for industrial cyber physical systems in the era of smart manufacturing. Computers in Industry 137, 103611 (2022)","journal-title":"Computers in Industry"},{"key":"1043_CR75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103543","volume":"136","author":"SM Khalil","year":"2024","unstructured":"Khalil, S.M., Bahsi, H., Kor\u00f5tko, T.: Threat modeling of industrial control systems: A systematic literature review. Computers & Security 136, 103543 (2024)","journal-title":"Computers & Security"},{"key":"1043_CR76","unstructured":"Shostack, A.: \u201cThe Ultimate Beginner\u2019s Guide to Threat Modeling.\u201d https:\/\/shostack.org\/resources\/threat-modeling.html, Accessed December (2024)"},{"key":"1043_CR77","unstructured":"\u201cThreat Modeling Manifesto.\u201d https:\/\/www.threatmodelingmanifesto.org\/, Accessed December (2024)"},{"key":"1043_CR78","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.cose.2019.03.010","volume":"84","author":"W Xiong","year":"2019","unstructured":"Xiong, W., Lagerstr\u00f6m, R.: Threat modeling - A systematic literature review. Computers and Security 84, 53\u201369 (2019)","journal-title":"Computers and Security"},{"key":"1043_CR79","unstructured":"\u201cFramework for Improving Critical Infrastructure Cybersecurity, Version 1.1,\u201d tech. rep., National Institute of Standards and Technology, Gaithersburg, MD, Apr. (2018)"},{"key":"1043_CR80","doi-asserted-by":"crossref","unstructured":"Kamatchi, R., Ambekar, K.: \u201cAnalyzing Impacts of Cloud Computing Threats in Attack based Classification Models,\u201d  Indian Journal of Science and Technology, vol.\u00a09, June (2016)","DOI":"10.17485\/ijst\/2016\/v9i21\/95282"},{"key":"1043_CR81","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.csi.2013.12.008","volume":"36","author":"AV Uzunov","year":"2014","unstructured":"Uzunov, A.V., Fernandez, E.B.: An extensible pattern-based library and taxonomy of security threats for distributed systems. Computer Standards & Interfaces 36, 734\u2013747 (2014)","journal-title":"Computer Standards & Interfaces"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01043-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01043-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01043-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:24Z","timestamp":1750500684000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01043-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":81,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1043"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01043-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"3 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"151"}}