{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:34:48Z","timestamp":1774647288699,"version":"3.50.1"},"reference-count":208,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100015720","name":"Universidad de Extremadura","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100015720","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The potential of digital twin technology is yet to be fully realised due to its diversity and untapped potential. Digital twins enable systems\u2019 analysis, design, optimisation, and evolution to be performed digitally or in conjunction with a cyber-physical approach to improve speed, accuracy, and efficiency over traditional engineering methods. Industry 4.0, factories of the future, and digital twins continue to benefit from the technology and provide enhanced efficiency within existing systems. Due to the lack of information and security standards associated with the transition to cyber digitisation, cybercriminals have been able to take advantage of the situation. Access to a digital twin of a product or service is equivalent to threatening the entire collection. There is a robust interaction between digital twins and artificial intelligence tools, which leads to strong interaction between these technologies, so it can be used to improve the cybersecurity of these digital platforms based on their integration with these technologies. This study aims to investigate the role of artificial intelligence in providing cybersecurity for digital twin versions of various industries, as well as the risks associated with these versions. In addition, this research serves as a road map for researchers and others interested in cybersecurity and digital security.<\/jats:p>","DOI":"10.1007\/s10462-024-10805-3","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T08:02:58Z","timestamp":1720598578000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":79,"title":["A review of digital twins and their application in cybersecurity based on artificial intelligence"],"prefix":"10.1007","volume":"57","author":[{"given":"Mohammadhossein","family":"Homaei","sequence":"first","affiliation":[]},{"given":"\u00d3scar","family":"Mogoll\u00f3n-Guti\u00e9rrez","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Carlos","family":"Sancho","sequence":"additional","affiliation":[]},{"given":"Mar","family":"\u00c1vila","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9s","family":"Caro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"10805_CR1","doi-asserted-by":"crossref","unstructured":"Abdelsattar A, Park EJ, zouk A (2022) An OPC UA client\/gateway-based digital twin architecture of a SCADA system with embedded system connections. In: 2022 IEEE\/ASME international conference on advanced intelligent mechatronics (AIM). IEEE","DOI":"10.1109\/AIM52237.2022.9863367"},{"issue":"2","key":"10805_CR2","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/electronics11020198","volume":"11","author":"M Abdullahi","year":"2022","unstructured":"Abdullahi M, Baashar Y, Alhussian H, Alwadain A, Aziz N, Capretz LF et al (2022) Detecting cybersecurity attacks in Internet of Things using artificial intelligence methods: a systematic literature review. Electronics 11(2):198. https:\/\/doi.org\/10.3390\/electronics11020198","journal-title":"Electronics"},{"issue":"2","key":"10805_CR3","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.46932\/sfjdv3n2-030","volume":"3","author":"AM Abed","year":"2022","unstructured":"Abed AM, Seddek LF, Elattar S, Gaafar TS (2022) The digital twin model of vehicle containers to provide an ergonomic handling mechanism. South Fla J Dev 3(2):1971\u20131992. https:\/\/doi.org\/10.46932\/sfjdv3n2-030","journal-title":"South Fla J Dev"},{"key":"10805_CR4","doi-asserted-by":"crossref","unstructured":"Abounassar EM, El-Kafrawy P, El-Latif AAA (2021) Security and interoperability issues with Internet of Things (IoT) in healthcare industry: a survey. In: Studies in big data. Springer, Cham, pp 159\u2013189","DOI":"10.1007\/978-3-030-85428-7_7"},{"issue":"7","key":"10805_CR5","doi-asserted-by":"publisher","first-page":"4850","DOI":"10.1109\/tii.2021.3096672","volume":"18","author":"M Adhikari","year":"2022","unstructured":"Adhikari M, Munusamy A, Kumar N, Srirama S (2022) Cybertwin-driven resource provisioning for IoE applications at 6G-enabled edge networks. IEEE Trans Ind Inf 18(7):4850\u20134858. https:\/\/doi.org\/10.1109\/tii.2021.3096672","journal-title":"IEEE Trans Ind Inf"},{"key":"10805_CR6","doi-asserted-by":"crossref","unstructured":"Adjei PO, Tetarave SK, John C, Manneh M, Pattnayak P (2024) Robust network anomaly detection with K-nearest neighbors (KNN) enhanced digital twins. In: SoutheastCon 2024. IEEE","DOI":"10.1109\/SoutheastCon52093.2024.10500053"},{"key":"10805_CR7","doi-asserted-by":"crossref","unstructured":"Ahlgren J, Bojarczuk K, Drossopoulou S, Dvortsova I, George J, Gucevska N, et\u00a0al (2021) Facebook\u2019s cyber\u2013cyber and cyber\u2013physical digital twins. In: Evaluation and assessment in software engineering. EASE ACM, New York","DOI":"10.1145\/3463274.3463275"},{"key":"10805_CR8","doi-asserted-by":"crossref","unstructured":"Akbarian F, Fitzgerald E, Kihl M (2020) Intrusion detection in digital twins for industrial control systems. In: 2020 International conference on software, telecommunications and computer networks (SoftCOM). IEEE","DOI":"10.23919\/SoftCOM50211.2020.9238162"},{"key":"10805_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2022.3208986","author":"M Alazab","year":"2022","unstructured":"Alazab M, Khan LU, Koppu S, Ramu SP, Meenakshisundaram I, Boobalan P et al (2022a) Digital twins for healthcare 4.0\u2014recent advances, architecture, and open challenges. IEEE Consumer Electron Mag. https:\/\/doi.org\/10.1109\/mce.2022.3208986","journal-title":"IEEE Consumer Electron Mag"},{"issue":"5","key":"10805_CR10","doi-asserted-by":"publisher","first-page":"3501","DOI":"10.1109\/tii.2021.3119038","volume":"18","author":"M Alazab","year":"2022","unstructured":"Alazab M, Swarna Priya RM, Parimala M, Maddikunta PKR, Gadekallu TR, Pham QV (2022b) Federated learning for cybersecurity: concepts, challenges, and future directions. IEEE Trans Ind Inf 18(5):3501\u20133509. https:\/\/doi.org\/10.1109\/tii.2021.3119038","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"10805_CR11","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/comst.2022.3171465","volume":"24","author":"C Alcaraz","year":"2022","unstructured":"Alcaraz C, Lopez J (2022) Digital twin: a comprehensive survey of security threats. IEEE Commun Surv Tutor 24(3):1475\u20131503. https:\/\/doi.org\/10.1109\/comst.2022.3171465","journal-title":"IEEE Commun Surv Tutor"},{"issue":"10","key":"10805_CR12","doi-asserted-by":"publisher","first-page":"5871","DOI":"10.3390\/app13105871","volume":"13","author":"WA Ali","year":"2023","unstructured":"Ali WA, Fanti MP, Roccotelli M, Ranieri L (2023) A review of digital twin technology for electric and autonomous vehicles. Appl Sci 13(10):5871. https:\/\/doi.org\/10.3390\/app13105871","journal-title":"Appl Sci"},{"key":"10805_CR13","doi-asserted-by":"crossref","unstructured":"Allison D, Smith P, Mclaughlin K (2023) Digital twin-enhanced incident response for cyber-physical systems. In: Proceedings of the 18th international conference on availability, reliability and security. ARES 2023. ACM, New York","DOI":"10.1145\/3600160.3600195"},{"key":"10805_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09659-3","author":"M Aloqaily","year":"2022","unstructured":"Aloqaily M, Kanhere S, Bellavista P, Nogueira M (2022) Special issue on cybersecurity management in the era of AI. J Netw Syst Manag. https:\/\/doi.org\/10.1007\/s10922-022-09659-3","journal-title":"J Netw Syst Manag"},{"issue":"18","key":"10805_CR15","doi-asserted-by":"publisher","first-page":"3958","DOI":"10.3390\/electronics12183958","volume":"12","author":"T AlSalem","year":"2023","unstructured":"AlSalem T, Almaiah M, Lutfi A (2023) Cybersecurity risk analysis in the IoT: a systematic review. Electronics 12(18):3958. https:\/\/doi.org\/10.3390\/electronics12183958","journal-title":"Electronics"},{"key":"10805_CR16","doi-asserted-by":"publisher","first-page":"159","DOI":"10.36680\/j.itcon.2021.010","volume":"26","author":"K Alshammari","year":"2021","unstructured":"Alshammari K, Beach T, Rezgui Y (2021) Cybersecurity for digital twins in the built environment: current research and future directions. J Inf Technol Constr 26:159\u2013173. https:\/\/doi.org\/10.36680\/j.itcon.2021.010","journal-title":"J Inf Technol Constr"},{"key":"10805_CR17","doi-asserted-by":"publisher","unstructured":"Alshammari K, Beach T, Rezgui Y (2021) industry engagement for identification of cybersecurity needs practices for digital twins. In: 2021 IEEE international conference on engineering, technology and innovation (ICE\/ITMC). IEEE. https:\/\/doi.org\/10.1109\/ICE\/ITMC52061.2021.9570208","DOI":"10.1109\/ICE\/ITMC52061.2021.9570208"},{"key":"10805_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3677","author":"F Al-Turjman","year":"2019","unstructured":"Al-Turjman F, Zahmatkesh H, Shahroze R (2019) An overview of security and privacy in smart cities\u2019 IoT communications. Transactions on Emerging Telecommunications Technologies. https:\/\/doi.org\/10.1002\/ett.3677","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10805_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2023.104794","volume":"98","author":"R Aluvalu","year":"2023","unstructured":"Aluvalu R, Mudrakola S, UmaMaheswari V, Kaladevi AC, Sandhya MVS, Bhat CR (2023) The novel emergency hospital services for patients using digital twins. Microprocessors Microsyst 98:104794. https:\/\/doi.org\/10.1016\/j.micpro.2023.104794","journal-title":"Microprocessors Microsyst"},{"issue":"14","key":"10805_CR20","doi-asserted-by":"publisher","first-page":"4941","DOI":"10.3390\/s21144941","volume":"21","author":"N Anjum","year":"2021","unstructured":"Anjum N, Latif Z, Lee C, Shoukat IA, Iqbal U (2021) MIND: a multi-source data fusion scheme for intrusion detection in networks. Sensors 21(14):4941. https:\/\/doi.org\/10.3390\/s21144941","journal-title":"Sensors"},{"key":"10805_CR21","doi-asserted-by":"publisher","DOI":"10.47893\/ijssan.2022.1212","author":"MF Ansari","year":"2022","unstructured":"Ansari MF (2022) A quantitative study of risk scores and the effectiveness of AI-based cybersecurity awareness training programs. Int J Smart Sens Adhoc Netw. https:\/\/doi.org\/10.47893\/ijssan.2022.1212","journal-title":"Int J Smart Sens Adhoc Netw"},{"key":"10805_CR22","doi-asserted-by":"publisher","DOI":"10.47893\/ijssan.2022.1221","author":"MF Ansari","year":"2022","unstructured":"Ansari MF, Sharma PK, Dash B (2022) Prevention of phishing attacks using AI-based cybersecurity awareness training. Int J Smart Sens Adhoc Netw. https:\/\/doi.org\/10.47893\/ijssan.2022.1221","journal-title":"Int J Smart Sens Adhoc Netw"},{"key":"10805_CR23","doi-asserted-by":"crossref","unstructured":"Arpita M, Panchal S (2022) Smart health and cybersecurity in the era of artificial intelligence. In: Information and communication technology for competitive strategies (ICTCS 2021). Springer, Singapore, pp 41\u201348","DOI":"10.1007\/978-981-19-0098-3_5"},{"key":"10805_CR24","doi-asserted-by":"publisher","unstructured":"Ashraf I, Park Y, Hur S, Kim SW, Alroobaea R, Zikria YB, et\u00a0al (2022) A survey on cyber security threats in IoT-enabled time industry. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/tits.2022.3164678","DOI":"10.1109\/tits.2022.3164678"},{"issue":"12","key":"10805_CR25","doi-asserted-by":"publisher","first-page":"7375","DOI":"10.3390\/su14127375","volume":"14","author":"N Aslam","year":"2022","unstructured":"Aslam N, Khan IU, Mirza S, AlOwayed A, Anis FM, Aljuaid RM et al (2022) Interpretable machine learning models for malicious domains detection using explainable artificial intelligence (XAI). Sustainability 14(12):7375. https:\/\/doi.org\/10.3390\/su14127375","journal-title":"Sustainability."},{"key":"10805_CR26","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1109\/access.2019.2950507","volume":"8","author":"J Autiosalo","year":"2020","unstructured":"Autiosalo J, Vepsalainen J, Viitala R, Tammi K (2020) A feature-based framework for structuring industrial digital twins. IEEE Access 8:1193\u20131208. https:\/\/doi.org\/10.1109\/access.2019.2950507","journal-title":"IEEE Access"},{"key":"10805_CR28","doi-asserted-by":"crossref","unstructured":"Balyakin AA, Nurbina MV, Taranenko SB (2022) Digital twins in real economy: unobvious effects. In: Proceeding of the international science and technology conference \u201cFarEastCYRSon 2021\u201d. Springer, Singapore, pp 699\u2013711","DOI":"10.1007\/978-981-16-8829-4_68"},{"issue":"2","key":"10805_CR29","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/tii.2022.3206798","volume":"19","author":"Z Bao","year":"2023","unstructured":"Bao Z, He D, Khan MK, Luo M, Xie Q (2023) PBidm: privacy-preserving blockchain-based identity management system for industrial Internet of Things. IEEE Trans Ind Inf 19(2):1524\u20131534. https:\/\/doi.org\/10.1109\/tii.2022.3206798","journal-title":"IEEE Trans Ind Inf"},{"key":"10805_CR30","doi-asserted-by":"crossref","unstructured":"Benedictis AD, Esposito C, Somma A (2022) Toward the\u00a0adoption of\u00a0secure cyber digital twins to\u00a0enhance cyber-physical systems security. In: Communications in computer and information science. Springer, Cham, pp 307\u2013321","DOI":"10.1007\/978-3-031-14179-9_21"},{"key":"10805_CR31","doi-asserted-by":"publisher","unstructured":"Bergs T, Gierlings S, Auerbach T, Klink A, Schraknepper D, Spurger T (2021) The concept of digital twin and digital shadow in manufacturing. Procedia CIRP 101:81\u201384. https:\/\/doi.org\/10.1016\/j.procir.2021.02.010","DOI":"10.1016\/j.procir.2021.02.010"},{"key":"10805_CR32","doi-asserted-by":"crossref","unstructured":"Bonfanti ME (2022) Artificial intelligence and the offense\u2013defense balance in cyber security. In: Cyber security politics. Routledge, London, pp 64\u201377","DOI":"10.4324\/9781003110224-6"},{"issue":"6","key":"10805_CR33","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.3390\/rs14061335","volume":"14","author":"DM Bot\u00edn-Sanabria","year":"2022","unstructured":"Bot\u00edn-Sanabria DM, Mihaita AS, Peimbert-Garc\u00eda RE, Ram\u00edrez-Moreno MA, Ram\u00edrez-Mendoza RA, de J. Lozoya-Santos J (2022) Digital twin technology challenges and applications: a comprehensive review. Remot Sens 14(6):1335. https:\/\/doi.org\/10.3390\/rs14061335","journal-title":"Remot Sens"},{"issue":"4","key":"10805_CR34","doi-asserted-by":"publisher","first-page":"2331","DOI":"10.1007\/s11831-020-09457-7","volume":"28","author":"C Boton","year":"2020","unstructured":"Boton C, Rivest L, Ghnaya O, Chouchen M (2020) What is at the root of construction 4.0: a systematic review of the recent research effort. Arch Comput Methods Eng 28(4):2331\u20132350. https:\/\/doi.org\/10.1007\/s11831-020-09457-7","journal-title":"Arch Comput Methods Eng"},{"key":"10805_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103763","volume":"143","author":"H Boyes","year":"2022","unstructured":"Boyes H, Watson T (2022) Digital twins: an analysis framework and open issues. Comput Ind 143:103763. https:\/\/doi.org\/10.1016\/j.compind.2022.103763","journal-title":"Comput Ind"},{"key":"10805_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2022.104171","volume":"136","author":"DG Broo","year":"2022","unstructured":"Broo DG, Bravo-Haro M, Schooling J (2022) Design and implementation of a smart infrastructure digital twin. Autom Constr 136:104171. https:\/\/doi.org\/10.1016\/j.autcon.2022.104171","journal-title":"Autom Constr"},{"issue":"11","key":"10805_CR37","doi-asserted-by":"publisher","first-page":"782","DOI":"10.3390\/educsci12110782","volume":"12","author":"MM B\u00fchler","year":"2022","unstructured":"B\u00fchler MM, Jelinek T, N\u00fcbel K (2022) Training and preparing tomorrow\u2019s workforce for the fourth industrial revolution. Educ Sci 12(11):782. https:\/\/doi.org\/10.3390\/educsci12110782","journal-title":"Educ Sci"},{"key":"10805_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103767","volume":"144","author":"P Calvo-Bascones","year":"2023","unstructured":"Calvo-Bascones P, Voisin A, Do P, Sanz-Bobi MA (2023) A collaborative network of digital twins for anomaly detection applications of complex systems. Snitch Digital Twin concept. Comput Ind 144:103767. https:\/\/doi.org\/10.1016\/j.compind.2022.103767","journal-title":"Comput Ind"},{"key":"10805_CR39","doi-asserted-by":"crossref","unstructured":"Can O, Turkmen A (2023) Digital twin and manufacturing, 8th edn. Springer, Singapore, pp 175\u2013194","DOI":"10.1007\/978-981-99-0252-1_8"},{"key":"10805_CR40","doi-asserted-by":"publisher","first-page":"93575","DOI":"10.1109\/access.2022.3204171","volume":"10","author":"N Capuano","year":"2022","unstructured":"Capuano N, Fenza G, Loia V, Stanzione C (2022) Explainable artificial intelligence in cybersecurity: a survey. IEEE Access 10:93575\u201393600. https:\/\/doi.org\/10.1109\/access.2022.3204171","journal-title":"IEEE Access"},{"issue":"7","key":"10805_CR41","doi-asserted-by":"publisher","first-page":"4733","DOI":"10.1109\/tii.2020.3019788","volume":"17","author":"A Castellani","year":"2021","unstructured":"Castellani A, Schmitt S, Squartini S (2021) Real-world anomaly detection by using digital twin systems and weakly supervised learning. IEEE Trans Ind Inf 17(7):4733\u20134742. https:\/\/doi.org\/10.1109\/tii.2020.3019788","journal-title":"IEEE Trans Ind Inf"},{"key":"10805_CR42","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.iotcps.2022.05.001","volume":"2","author":"D Chen","year":"2022","unstructured":"Chen D, Lv Z (2022) Artificial intelligence enabled digital twins for training autonomous cars. Internet Things Cyber-Physi Syst 2:31\u201341. https:\/\/doi.org\/10.1016\/j.iotcps.2022.05.001","journal-title":"Internet Things Cyber-Phys Syst"},{"issue":"1","key":"10805_CR43","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s11831-018-9301-4","volume":"27","author":"F Chinesta","year":"2018","unstructured":"Chinesta F, Cueto E, Abisset-Chavanne E, Duval JL, Khaldi FE (2018) Virtual, digital and hybrid twins: a new paradigm in data-based engineering and engineered data. Arch Comput Methods Eng 27(1):105\u2013134. https:\/\/doi.org\/10.1007\/s11831-018-9301-4","journal-title":"Arch Comput Methods Eng"},{"key":"10805_CR44","doi-asserted-by":"publisher","first-page":"207308","DOI":"10.1109\/access.2020.3037705","volume":"8","author":"A Chowdhury","year":"2020","unstructured":"Chowdhury A, Karmakar G, Kamruzzaman J, Jolfaei A, Das R (2020) Attacks on self-driving cars and their countermeasures: a survey. IEEE Access 8:207308\u2013207342. https:\/\/doi.org\/10.1109\/access.2020.3037705","journal-title":"IEEE Access"},{"issue":"1","key":"10805_CR45","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/ms.2022.3171305","volume":"40","author":"ACF da Silva","year":"2023","unstructured":"da Silva ACF, Wagner S, Lazebnik E, Traitel E (2023) Using a cyber digital twin for continuous automotive security requirements verification. IEEE Softw 40(1):69\u201376. https:\/\/doi.org\/10.1109\/ms.2022.3171305","journal-title":"IEEE Softw"},{"issue":"7","key":"10805_CR46","doi-asserted-by":"publisher","first-page":"4922","DOI":"10.1109\/tii.2021.3140125","volume":"18","author":"SP Dash","year":"2022","unstructured":"Dash SP, Joshi S, Satapathy SC, Shandilya SK, Panda G (2022) A cybertwin-based 6G cooperative IoE communication network: secrecy outage analysis. IEEE Trans Ind Inf 18(7):4922\u20134932. https:\/\/doi.org\/10.1109\/tii.2021.3140125","journal-title":"IEEE Trans Ind Inf"},{"key":"10805_CR47","doi-asserted-by":"publisher","unstructured":"de\u00a0Azambuja AJG, Giese T, Sch\u00fctzer K, Anderl R, Schleich B, Almeida VR (2024) Digital twins in Industry 4.0\u2014opportunities and challenges related to cyber security. Procedia CIRP 121:25\u201330. https:\/\/doi.org\/10.1016\/j.procir.2023.09.225","DOI":"10.1016\/j.procir.2023.09.225"},{"key":"10805_CR48","doi-asserted-by":"publisher","unstructured":"de\u00a0Souza\u00a0Junior AA, de\u00a0Souza\u00a0Pio JL, Fonseca JC, Oliveira MAD, de\u00a0Paiva\u00a0Valadares OC, Silva PHSD (2021) The state of cybersecurity in smart manufacturing systems: a systematic review. Eur J Bus Manag Res 6(6):188\u2013194. https:\/\/doi.org\/10.24018\/ejbmr.2021.6.6.1173","DOI":"10.24018\/ejbmr.2021.6.6.1173"},{"key":"10805_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2021.101332","volume":"49","author":"JMD Delgado","year":"2021","unstructured":"Delgado JMD, Oyedele L (2021) Digital Twins for the built environment: learning from conceptual and process models in manufacturing. Adv Eng Inform 49:101332. https:\/\/doi.org\/10.1016\/j.aei.2021.101332","journal-title":"Adv Eng Inform"},{"key":"10805_CR50","doi-asserted-by":"crossref","unstructured":"Dietz M, Hageman L, von Hornung C, Pernul G (2022) Employing digital twins for security-by-design system testing. In: Proceedings of the 2022 ACM workshop on secure and trustworthy cyber-physical systems, CODASPY \u201922. ACM, New York","DOI":"10.1145\/3510547.3517929"},{"key":"10805_CR51","doi-asserted-by":"publisher","unstructured":"Dinis FM, Po\u00e7as Martins J, Guimar\u00e3es AS, Rangel B (2021) BIM and semantic enrichment methods and applications: a review of recent developments. Arch Comput Methods Eng 29(2):879\u2013895. https:\/\/doi.org\/10.1007\/s11831-021-09595-6","DOI":"10.1007\/s11831-021-09595-6"},{"key":"10805_CR52","doi-asserted-by":"crossref","unstructured":"Dodiya KR, Jha M, Jha S (2024) Fortifying the digital forge: unleashing cybersecurity in the interconnected world of digital manufacturing. IGI Global, Hershey, pp 230\u2013256","DOI":"10.4018\/979-8-3693-0920-9.ch014"},{"issue":"13","key":"10805_CR53","doi-asserted-by":"publisher","first-page":"6520","DOI":"10.3390\/app12136520","volume":"12","author":"M Dom\u00ednguez","year":"2022","unstructured":"Dom\u00ednguez M, Fuertes JJ, Prada MA, Alonso S, Mor\u00e1n A, P\u00e9rez D (2022) Design of platforms for experimentation in industrial cybersecurity. Appl Sci 12(13):6520. https:\/\/doi.org\/10.3390\/app12136520","journal-title":"Appl Sci"},{"key":"10805_CR54","doi-asserted-by":"crossref","unstructured":"Ebrahimabadi M, Bahrami J, Younis M, Karimi N (2023) Digital twin integrity protection in distributed control systems. In: IEEE consumer communications & networking conference (CCNC), Las Vegas","DOI":"10.1109\/CCNC51664.2024.10454732"},{"issue":"4","key":"10805_CR55","doi-asserted-by":"publisher","first-page":"3470","DOI":"10.3390\/su15043470","volume":"15","author":"N El Bazi","year":"2023","unstructured":"El Bazi N, Mabrouki M, Laayati O, Ouhabi N, El Hadraoui H, Hammouch FE et al (2023) Generic multi-layered digital-twin-framework-enabled asset lifecycle management for the sustainable mining industry. Sustainability 15(4):3470. https:\/\/doi.org\/10.3390\/su15043470","journal-title":"Sustainability."},{"key":"10805_CR56","doi-asserted-by":"publisher","unstructured":"El-Hajj M, It\u00e4pelto T, Gebremariam T (2024) Systematic literature review: digital twins\u2019 role in enhancing security for Industry 4.0 applications. Secur Privacy. https:\/\/doi.org\/10.1002\/spy2.396","DOI":"10.1002\/spy2.396"},{"key":"10805_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2023.102744","volume":"125","author":"G Epiphaniou","year":"2023","unstructured":"Epiphaniou G, Hammoudeh M, Yuan H, Maple C, Ani U (2023) Digital twins in cyber effects modelling of IoT\/CPS points of low resilience. Simul Model Pract Theory 125:102744. https:\/\/doi.org\/10.1016\/j.simpat.2023.102744","journal-title":"Simul Model Pract Theory"},{"issue":"7\u20138","key":"10805_CR58","doi-asserted-by":"publisher","first-page":"4289","DOI":"10.1007\/s00170-022-09632-z","volume":"121","author":"X Fang","year":"2022","unstructured":"Fang X, Wang H, Liu G, Tian X, Ding G, Zhang H (2022) Industry application of digital twin: from concept to implementation. Int J Adv Manuf Technol 121(7\u20138):4289\u20134312. https:\/\/doi.org\/10.1007\/s00170-022-09632-z","journal-title":"Int J Adv Manuf Technol"},{"key":"10805_CR59","doi-asserted-by":"publisher","unstructured":"Farhan BI, Jasim AD (2022) A survey of intrusion detection using deep learning in Internet of Things. Iraqi J Comput Sci Math. https:\/\/doi.org\/10.52866\/ijcsm.2022.01.01.009","DOI":"10.52866\/ijcsm.2022.01.01.009"},{"key":"10805_CR60","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Kantarci B, Cordeiro LC, Debbah M, Choo KKR (2023) Poisoning attacks in federated edge learning for digital twin 6G-enabled IoTs: an anticipatory study. In: 2023 IEEE International conference on communications workshops (ICC Workshops). IEEE","DOI":"10.1109\/ICCWorkshops57953.2023.10283797"},{"issue":"6","key":"10805_CR61","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.3390\/s22062196","volume":"22","author":"G Fortino","year":"2022","unstructured":"Fortino G, Guerrieri A, Pace P, Savaglio C, Spezzano G (2022) IoT platforms and security: an analysis of the leading industrial\/commercial solutions. Sensors 22(6):2196. https:\/\/doi.org\/10.3390\/s22062196","journal-title":"Sensors"},{"issue":"11","key":"10805_CR62","doi-asserted-by":"publisher","first-page":"8229","DOI":"10.1109\/jiot.2022.3150363","volume":"9","author":"B Ghimire","year":"2022","unstructured":"Ghimire B, Rawat DB (2022) Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for Internet of Things. IEEE Internet Things J 9(11):8229\u20138249. https:\/\/doi.org\/10.1109\/jiot.2022.3150363","journal-title":"IEEE Internet Things J"},{"key":"10805_CR63","doi-asserted-by":"crossref","unstructured":"Grasselli C, Melis A, Rinieri L, Berardi D, Gori G, Sadi AA (2022) An Industrial network digital twin for enhanced security of cyber-physical systems. In: 2022 International symposium on networks, computers and communications (ISNCC). IEEE","DOI":"10.1109\/ISNCC55209.2022.9851731"},{"issue":"19","key":"10805_CR64","doi-asserted-by":"publisher","first-page":"26941","DOI":"10.1007\/s11042-022-12536-5","volume":"81","author":"J Guo","year":"2022","unstructured":"Guo J, Lv Z (2022) Application of Digital Twins in multiple fields. Multimedia Tools Appl 81(19):26941\u201326967. https:\/\/doi.org\/10.1007\/s11042-022-12536-5","journal-title":"Multimedia Tools Appl"},{"key":"10805_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.05.023","author":"J Guo","year":"2022","unstructured":"Guo J, Bilal M, Qiu Y, Qian C, Xu X, Choo KKR (2022) Survey on digital twins for Internet of vehicles: fundamentals, challenges, and opportunities. Digit Commun Netw. https:\/\/doi.org\/10.1016\/j.dcan.2022.05.023","journal-title":"Digit Commun Netw"},{"key":"10805_CR66","doi-asserted-by":"crossref","unstructured":"Hailu TA, Viajiprabhu G, Endris AS, Arappali N (2022) Artificial intelligence based network security system to predict the possible threats in healthcare data. In: 2022 International conference on sustainable computing and data communication systems (ICSCDS). IEEE","DOI":"10.1109\/ICSCDS53736.2022.9760951"},{"key":"10805_CR67","doi-asserted-by":"crossref","unstructured":"Hariharan S, Velicheti A, Anagha AS, Thomas C, Balakrishnan N (2021) Explainable artificial intelligence in cybersecurity: a brief review. In: 2021 4th International conference on security and Privacy (ISEA-ISAP). IEEE","DOI":"10.1109\/ISEA-ISAP54304.2021.9689765"},{"issue":"3","key":"10805_CR68","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1007\/s11277-023-10538-6","volume":"131","author":"EED Hemdan","year":"2023","unstructured":"Hemdan EED, El-Shafai W, Sayed A (2023) Integrating digital twins with IoT-based blockchain: concept, architecture, challenges, and future scope. Wirel Pers Commun 131(3):2193\u20132216. https:\/\/doi.org\/10.1007\/s11277-023-10538-6","journal-title":"Wirel Pers Commun"},{"key":"10805_CR69","doi-asserted-by":"crossref","unstructured":"Herwig C, P\u00f6rtner R, M\u00f6ller J (eds) (2021) Digital twins. Springer, Cham","DOI":"10.1007\/978-3-030-71660-8"},{"key":"10805_CR70","doi-asserted-by":"crossref","unstructured":"Ho ESL (2021) Data Security challenges in deep neural network for healthcare IoT systems. In: Studies in big data. Springer, Cham Cham, pp 19\u201337","DOI":"10.1007\/978-3-030-85428-7_2"},{"key":"10805_CR71","doi-asserted-by":"crossref","unstructured":"Holmes D, Papathanasaki M, Maglaras L, Ferrag MA, Nepal S, icke H (2021) Digital twins and cyber security\u2014solution or challenge? In: 2021 6th South-East Europe design automation, computer engineering, computer networks and social media conference (SEEDA-CECNSM). IEEE","DOI":"10.1109\/SEEDA-CECNSM53056.2021.9566277"},{"issue":"14","key":"10805_CR72","doi-asserted-by":"publisher","first-page":"3173","DOI":"10.3390\/s19143173","volume":"19","author":"MH Homaei","year":"2019","unstructured":"Homaei MH, Salwana E, Shamshirband S (2019) An enhanced distributed data aggregation method in the Internet of Things. Sensors 19(14):3173. https:\/\/doi.org\/10.3390\/s19143173","journal-title":"Sensors"},{"key":"10805_CR73","doi-asserted-by":"publisher","first-page":"20628","DOI":"10.1109\/access.2020.2968524","volume":"8","author":"MH Homaei","year":"2020","unstructured":"Homaei MH, Soleimani F, Shamshirband S, Mosavi A, Nabipour N, Varkonyi-Koczy AR (2020) An enhanced distributed congestion control method for classical 6LowPAN protocols using fuzzy decision system. IEEE Access 8:20628\u201320645. https:\/\/doi.org\/10.1109\/access.2020.2968524","journal-title":"IEEE Access."},{"key":"10805_CR74","doi-asserted-by":"publisher","first-page":"63131","DOI":"10.1109\/access.2021.3075378","volume":"9","author":"MH Homaei","year":"2021","unstructured":"Homaei MH, Band SS, Pescape A, Mosavi A (2021) DDSLA-RPL: dynamic ision system based on learning automata in the RPL protocol for achieving QoS. IEEE Access. 9:63131\u201363148. https:\/\/doi.org\/10.1109\/access.2021.3075378","journal-title":"IEEE Access."},{"key":"10805_CR75","doi-asserted-by":"publisher","unstructured":"Homaei M, Caro\u00a0Lindo A, Mogollon-Gutierrez O, Diaz\u00a0Alonso J (2022) The role of artificial intelligence in digital twin\u2019s cybersecurity. XVII Reuni\u00f3n espa\u00f1ola sobre criptolog\u00eda y seguridad de la informaci\u00f3n RECSI 265:133. https:\/\/doi.org\/10.22429\/Euc2022.028","DOI":"10.22429\/Euc2022.028"},{"key":"10805_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103508","volume":"133","author":"K Hribernik","year":"2021","unstructured":"Hribernik K, Cabri G, Mandreoli F, Mentzas G (2021) Autonomous, context-aware, adaptive Digital Twins\u2014state of the art and roadmap. Comput Ind 133:103508. https:\/\/doi.org\/10.1016\/j.compind.2021.103508","journal-title":"Comput Ind"},{"key":"10805_CR77","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.jmsy.2020.01.009","volume":"54","author":"S Huang","year":"2020","unstructured":"Huang S, Wang G, Yan Y, Fang X (2020) Blockchain-based data management for digital twin of product. J Manuf Syst 54:361\u2013371. https:\/\/doi.org\/10.1016\/j.jmsy.2020.01.009","journal-title":"J Manuf Syst"},{"key":"10805_CR78","doi-asserted-by":"crossref","unstructured":"Human C, Basson AH, Kruger K (2021) Digital twin data pipeline using MQTT in SLADTA. In: Service oriented, holonic and multi-agent manufacturing systems for industry of the future. Springer, Cham, pp 111\u2013122","DOI":"10.1007\/978-3-030-69373-2_7"},{"issue":"1","key":"10805_CR79","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/comst.2022.3141490","volume":"24","author":"R Huo","year":"2022","unstructured":"Huo R, Zeng S, Wang Z, Shang J, Chen W, Huang T et al (2022) A comprehensive survey on blockchain in industrial Internet of Things: motivations, research progresses, and future challenges. IEEE Commun Surv Tutor 24(1):88\u2013122. https:\/\/doi.org\/10.1109\/comst.2022.3141490","journal-title":"IEEE Commun Surv Tutor"},{"key":"10805_CR80","doi-asserted-by":"crossref","unstructured":"Hussaini A, Qian C, Liao W, Yu W (2022) A taxonomy of security and defense mechanisms in digital twins-based cyber-physical systems. In: 2022 IEEE international conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics). IEEE","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00112"},{"issue":"11","key":"10805_CR81","doi-asserted-by":"publisher","first-page":"7669","DOI":"10.1109\/tcomm.2022.3205692","volume":"70","author":"DV Huynh","year":"2022","unstructured":"Huynh DV, Nguyen VD, Khosravirad SR, Sharma V, Dobre OA, Shin H et al (2022) URLLC edge networks with joint optimal user association, task offloading and resource allocation: a digital twin approach. IEEE Trans Commun 70(11):7669\u20137682. https:\/\/doi.org\/10.1109\/tcomm.2022.3205692","journal-title":"IEEE Trans Commun"},{"issue":"2\/3","key":"10805_CR82","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1504\/ijmms.2022.124922","volume":"15","author":"K Jarosz","year":"2022","unstructured":"Jarosz K, \u00d6zel T (2022) Machine learning approaches towards digital twin development for machining systems. Int J Mechatron Manuf Syst 15(2\/3):127. https:\/\/doi.org\/10.1504\/ijmms.2022.124922","journal-title":"Int J Mechatron Manuf Syst"},{"key":"10805_CR83","doi-asserted-by":"publisher","first-page":"52609","DOI":"10.1109\/access.2022.3174220","volume":"10","author":"DY Jeong","year":"2022","unstructured":"Jeong DY, Baek MS, Lim TB, Kim YW, Kim SH, Lee YT et al (2022) Digital twin: technology evolution stages and implementation layers with technology elements. IEEE Access 10:52609\u201352620. https:\/\/doi.org\/10.1109\/access.2022.3174220","journal-title":"IEEE Access"},{"key":"10805_CR84","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2024.103650","volume":"64","author":"C Ji","year":"2024","unstructured":"Ji C, Niu Y (2024) A hybrid evolutionary and machine learning approach for smart city planning: digital twin approach. Sustain Energy Technol Assess 64:103650. https:\/\/doi.org\/10.1016\/j.seta.2024.103650","journal-title":"Sustain Energy Technol Assess"},{"key":"10805_CR85","doi-asserted-by":"crossref","unstructured":"Jimenez JI, Jahankhani H, Kendzierskyj S (2019) Health care in the cyberspace: medical cyber-physical system and digital twin challenges. In: Internet of Things. Springer, Cham, pp 79\u201392","DOI":"10.1007\/978-3-030-18732-3_6"},{"key":"10805_CR86","doi-asserted-by":"crossref","unstructured":"Job D, Paul V (2022) Challenges, security mechanisms, and research areas in IoT and IioT. In: Internet of Things and its applications. Springer, Cham, pp 523\u2013538","DOI":"10.1007\/978-3-030-77528-5_28"},{"key":"10805_CR87","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2023.103923","volume":"149","author":"J Kaiser","year":"2023","unstructured":"Kaiser J, McFarlane D, Hawkridge G, Andr\u00e9 P, Leit\u00e3o P (2023) A review of reference architectures for digital manufacturing: classification, applicability and open issues. Comput Ind 149:103923. https:\/\/doi.org\/10.1016\/j.compind.2023.103923","journal-title":"Comput Ind"},{"key":"10805_CR88","doi-asserted-by":"publisher","first-page":"01003","DOI":"10.1051\/itmconf\/20224301003","volume":"43","author":"A Kaissar","year":"2022","unstructured":"Kaissar A, Nassif AB, Injadat M (2022) A survey on network intrusion detection using convolutional neural network. ITM Web Conf 43:01003. https:\/\/doi.org\/10.1051\/itmconf\/20224301003","journal-title":"ITM Web Conf"},{"key":"10805_CR89","doi-asserted-by":"crossref","unstructured":"Kale R, Lu Z, Fok KW, Thing VLL (2022) A hybrid deep learning anomaly detection framework for intrusion detection. In: 2022 IEEE 8th international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC) and IEEE international conference on intelligent data and security (IDS). IEEE","DOI":"10.1109\/BigDataSecurityHPSCIDS54978.2022.00034"},{"key":"10805_CR90","doi-asserted-by":"crossref","unstructured":"Kaur MJ, Mishra VP, Maheshwari P (2020) The convergence of digital twin, IoT, and machine learning: transforming data into action. In: Internet of Things. Springer, Cham, pp 3\u201317","DOI":"10.1007\/978-3-030-18732-3_1"},{"issue":"11s","key":"10805_CR91","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3510410","volume":"54","author":"H Kayan","year":"2022","unstructured":"Kayan H, Nunes M, Rana O, Burnap P, Perera C (2022) Cybersecurity of industrial cyber-physical systems: a review. ACM Comput Surv 54(11s):1\u201335. https:\/\/doi.org\/10.1145\/3510410","journal-title":"ACM Comput Surv"},{"issue":"1","key":"10805_CR92","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/mcom.001.21143","volume":"60","author":"LU Khan","year":"2022","unstructured":"Khan LU, Saad W, Niyato D, Han Z, Hong CS (2022) Digital-twin-enabled 6G: vision, architectural trends, and future directions. IEEE Commun Mag 60(1):74\u201380. https:\/\/doi.org\/10.1109\/mcom.001.21143","journal-title":"IEEE Commun Mag"},{"key":"10805_CR93","doi-asserted-by":"publisher","unstructured":"Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity. https:\/\/doi.org\/10.1186\/s42400-021-00077-7","DOI":"10.1186\/s42400-021-00077-7"},{"key":"10805_CR94","doi-asserted-by":"publisher","unstructured":"Kim M, Lim C, Hsuan J (2023) From technology enablers to circular economy: data-driven understanding of the overview of servitization and product\u2013service systems in Industry 4.0. Comput Ind 148:103908. https:\/\/doi.org\/10.1016\/j.compind.2023.103908","DOI":"10.1016\/j.compind.2023.103908"},{"key":"10805_CR95","doi-asserted-by":"publisher","unstructured":"Kor M, Yitmen I, Alizadehsalehi S (2023) An investigation for integration of deep learning and digital twins towards construction 4.0. Smart Sustain Built Environ 12(3):461\u2013487. https:\/\/doi.org\/10.1108\/SASBE-08-2021-0148","DOI":"10.1108\/SASBE-08-2021-0148"},{"key":"10805_CR96","doi-asserted-by":"crossref","unstructured":"Korovin G (2022) Digital twins in the industry: maturity, functions, effects. In: Lecture notes in information systems and organisation. Springer, Cham, pp 1\u201312","DOI":"10.1007\/978-3-030-94617-3_1"},{"key":"10805_CR97","doi-asserted-by":"crossref","unstructured":"Kose U (2023) Security issues in artificial intelligence use for metaverse and digital twin setups. In: Digital twin driven intelligent systems and emerging metaverse. Springer, Singapore, pp 331\u2013349","DOI":"10.1007\/978-981-99-0252-1_17"},{"key":"10805_CR98","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04320-x","author":"S Krishnaveni","year":"2024","unstructured":"Krishnaveni S, Chen TM, Sathiyanarayanan M, Amutha B (2024) CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems. Clust Comput. https:\/\/doi.org\/10.1007\/s10586-024-04320-x","journal-title":"Clust Comput"},{"key":"10805_CR99","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.procir.2022.05.008","volume":"107","author":"S Kr\u00fcckemeier","year":"2022","unstructured":"Kr\u00fcckemeier S, Anderl R (2022) Concept for digital twin based virtual part inspection for additive manufacturing. Procedia CIRP 107:458\u2013462. https:\/\/doi.org\/10.1016\/j.procir.2022.05.008","journal-title":"Procedia CIRP"},{"key":"10805_CR100","doi-asserted-by":"crossref","unstructured":"Krzyczkowski D (2019) Introducing azure digital twins: IoT device integration in digital and physical spaces. O'Reilly, Sebastopol","DOI":"10.1007\/978-1-4842-5375-5_1"},{"key":"10805_CR101","doi-asserted-by":"crossref","unstructured":"Kuleshov YA, Nagpal K, Ucpinar K, Gadaginmath A, Gadaginmath S, O\u2019Daniel K, et\u00a0al (2024) Cyber attacks on avionics networks in digital twin environment: detection and defense. In: AIAA SCITECH 2024 forum. American Institute of Aeronautics and Astronautics, Reston","DOI":"10.2514\/6.2024-0277"},{"key":"10805_CR102","doi-asserted-by":"crossref","unstructured":"Kulik T, Gomes C, Macedo HD, Hallerstede S, Larsen PG (2022). Towards secure digital twins. In: Lecture notes in computer science. Springer, Cham, pp 159\u2013176","DOI":"10.1007\/978-3-031-19762-8_11"},{"key":"10805_CR103","doi-asserted-by":"publisher","unstructured":"Kumar K, Pande BP (2022) Applications of machine learning techniques in the realm of cybersecurity. Cyber Secur Digit Forensics. https:\/\/doi.org\/10.1002\/9781119795667.ch13","DOI":"10.1002\/9781119795667.ch13"},{"issue":"3","key":"10805_CR104","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3491221","volume":"18","author":"W Lalouani","year":"2022","unstructured":"Lalouani W, Younis M, Ebrahimabadi M, Karimi N (2022) Countering modeling attacks in PUF-based IoT security solutions. ACM J Emerg Technol Comput Syst 18(3):1\u201328. https:\/\/doi.org\/10.1145\/3491221","journal-title":"ACM J Emerg Technol Comput Syst"},{"issue":"11","key":"10805_CR105","doi-asserted-by":"publisher","first-page":"22630","DOI":"10.1109\/tits.2022.3183379","volume":"23","author":"J Liu","year":"2022","unstructured":"Liu J, Zhang L, Li C, Bai J, Lv H, Lv Z (2022) Blockchain-based secure communication of intelligent transportation digital twins system. IEEE Trans Intell Transp Syst 23(11):22630\u201322640. https:\/\/doi.org\/10.1109\/tits.2022.3183379","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"10805_CR106","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40436-021-00375-w","volume":"10","author":"YK Liu","year":"2022","unstructured":"Liu YK, Ong SK, Nee AYC (2022) State-of-the-art survey on digital twin implementations. Adv Manuf 10(1):1\u201323. https:\/\/doi.org\/10.1007\/s40436-021-00375-w","journal-title":"Adv Manuf"},{"key":"10805_CR107","doi-asserted-by":"publisher","unstructured":"Liu Y, Zhang W, Li L, Wu J, Xia Y, Gao S et\u00a0al (2024) Toward autonomous trusted networks\u2014from digital twin perspective. IEEE Netw. https:\/\/doi.org\/10.1109\/mnet.2024.3353180","DOI":"10.1109\/mnet.2024.3353180"},{"key":"10805_CR108","doi-asserted-by":"crossref","unstructured":"Li S, Wu W, Meng Y, Li J, Zhu H, Shen XS (2023) Data poisoning attack against anomaly detectors in digital twin-based networks. In: ICC 2023\u2014IEEE international conference on communications. IEEE","DOI":"10.1109\/ICC45041.2023.10279765"},{"key":"10805_CR109","doi-asserted-by":"publisher","unstructured":"Luzzi J, Naha R, Arulappan A, Mahanti A (2024) SoK: a holistic view of cyberattacks prediction with digital twins. In: 2024 2nd International conference on emerging trends in information technology and engineering (ICETITE). IEEE. https:\/\/doi.org\/10.1109\/ic-ETITE58242.2024.10493514","DOI":"10.1109\/ic-ETITE58242.2024.10493514"},{"issue":"4","key":"10805_CR110","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3522760","volume":"13","author":"Z Lv","year":"2022","unstructured":"Lv Z, Chen D, Feng H, Singh AK, Wei W, Lv H (2022a) Computational intelligence in security of digital twins big graphic data in cyber-physical systems of smart cities. ACM Trans Manag Inf Syst 13(4):1\u201317. https:\/\/doi.org\/10.1145\/3522760","journal-title":"ACM Trans Manag Inf Syst"},{"issue":"9","key":"10805_CR111","doi-asserted-by":"publisher","first-page":"16666","DOI":"10.1109\/tits.2021.3113779","volume":"23","author":"Z Lv","year":"2022","unstructured":"Lv Z, Li Y, Feng H, Lv H (2022b) Deep learning for security in digital twins of cooperative intelligent transportation systems. IEEE Trans Intell Transp Syst 23(9):16666\u201316675. https:\/\/doi.org\/10.1109\/tits.2021.3113779","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10805_CR112","doi-asserted-by":"publisher","unstructured":"Lv Z, Cheng C, Lv H (2023) Blockchain based entralized learning for security in digital twins. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/jiot.2023.3295499","DOI":"10.1109\/jiot.2023.3295499"},{"key":"10805_CR113","doi-asserted-by":"publisher","unstructured":"Ma J, Guo Y, Fang C, Zhang Q (2024) Digital-twin-based CPS anomaly diagnosis and security defense countermeasure recommendation. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/jiot.2024.3366904","DOI":"10.1109\/jiot.2024.3366904"},{"issue":"23","key":"10805_CR114","doi-asserted-by":"publisher","first-page":"2926","DOI":"10.3390\/electronics10232926","volume":"10","author":"R Majeed","year":"2021","unstructured":"Majeed R, Abdullah NA, Mushtaq MF, Umer M, Nappi M (2021) Intelligent cyber-security system for IoT-aided drones using voting classifier. Electronics 10(23):2926. https:\/\/doi.org\/10.3390\/electronics10232926","journal-title":"Electronics"},{"issue":"6","key":"10805_CR115","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3410160","volume":"53","author":"SN Matheu","year":"2020","unstructured":"Matheu SN, Hern\u00e1ndez-Ramos JL, Skarmeta AF, Baldini G (2020) A survey of cybersecurity certification for the Internet of Things. ACM Comput Surv 53(6):1\u201336. https:\/\/doi.org\/10.1145\/3410160","journal-title":"ACM Comput Surv"},{"key":"10805_CR116","doi-asserted-by":"publisher","unstructured":"Mogollon-Gutierrez O, Sancho\u00a0Nu\u00f1ez JC, Avila\u00a0Vegas M, Caro\u00a0Lindo A (2023) A novel ensemble learning system for cyberattack classification. Intell Automation Soft Comput 37(2):1691\u20131709. https:\/\/doi.org\/10.32604\/iasc.2023.039255","DOI":"10.32604\/iasc.2023.039255"},{"key":"10805_CR117","doi-asserted-by":"publisher","DOI":"10.4230\/DAGREP.12.4.54","author":"AC Mora","year":"2022","unstructured":"Mora AC, Nadjm-Tehrani S, Weippl E, Eckhart M (2022) Digital twins for cyber-physical systems security (Dagstuhl Seminar 22171). TBD. https:\/\/doi.org\/10.4230\/DAGREP.12.4.54","journal-title":"TBD."},{"key":"10805_CR118","doi-asserted-by":"publisher","unstructured":"Moya B, Bad\u00edas A, Gonz\u00e1lez D, Chinesta F, Cueto E (2023) Computational sensing, understanding, and reasoning: an artificial intelligence approach to physics-informed world modeling. Arch Comput Methods Eng. https:\/\/doi.org\/10.1007\/s11831-023-10033-y","DOI":"10.1007\/s11831-023-10033-y"},{"key":"10805_CR119","doi-asserted-by":"publisher","unstructured":"Mullet V, Sondi P, Ramat E (2021) A review of cybersecurity guidelines for manufacturing factories in industry 4.0. IEEE Access 9:23235\u201323263. https:\/\/doi.org\/10.1109\/access.2021.3056650","DOI":"10.1109\/access.2021.3056650"},{"key":"10805_CR120","doi-asserted-by":"crossref","unstructured":"Mylrea M, Nielsen M, John J, Abbaszadeh M (2021) Digital twin industrial immune system: AI-driven cybersecurity for critical infrastructures. Springer, Cham, pp 197\u2013212","DOI":"10.1007\/978-3-030-77283-3_10"},{"key":"10805_CR121","doi-asserted-by":"publisher","first-page":"77653","DOI":"10.1109\/access.2020.2989113","volume":"8","author":"JCS Nunez","year":"2020","unstructured":"Nunez JCS, Lindo AC, Rodriguez PG (2020) A preventive secure software development model for a software factory: a case study. IEEE Access 8:77653\u201377665. https:\/\/doi.org\/10.1109\/access.2020.2989113","journal-title":"IEEE Access."},{"issue":"3","key":"10805_CR122","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/mic.2021.3063674","volume":"26","author":"JC Olivares-Rojas","year":"2022","unstructured":"Olivares-Rojas JC, Reyes-Archundia E, Gutierrez-Gnecchi JA, Molina-Moreno I, Cerda-Jacobo J, Mendez-Patino A (2022) Towards cybersecurity of the smart grid using digital twins. IEEE Internet Comput 26(3):52\u201357. https:\/\/doi.org\/10.1109\/mic.2021.3063674","journal-title":"IEEE Internet Comput"},{"issue":"14","key":"10805_CR123","doi-asserted-by":"publisher","first-page":"6641","DOI":"10.3390\/s23146641","volume":"23","author":"A Onwubiko","year":"2023","unstructured":"Onwubiko A, Singh R, Awan S, Pervez Z, Ramzan N (2023) Enabling trust and security in digital twin management: a blockchain-based approach with ethereum and IPFS. Sensors 23(14):6641. https:\/\/doi.org\/10.3390\/s23146641","journal-title":"Sensors."},{"key":"10805_CR124","doi-asserted-by":"publisher","unstructured":"Ortega-Gras JJ, Bueno-Delgado MV, Ca\u00f1avate-Cruzado G, Garrido-Lova J (2021) Twin transition through the Implementation of Industry 4.0 technologies: desk-research analysis and practical use cases in Europe. Sustainability 13(24):13601. https:\/\/doi.org\/10.3390\/su132413601","DOI":"10.3390\/su132413601"},{"issue":"2","key":"10805_CR125","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/ms.2021.3130872","volume":"39","author":"I Ozkaya","year":"2022","unstructured":"Ozkaya I (2022) Architectural concerns of digital twins. IEEE Softw 39(2):3\u20136. https:\/\/doi.org\/10.1109\/ms.2021.3130872","journal-title":"IEEE Softw"},{"key":"10805_CR126","doi-asserted-by":"crossref","unstructured":"Pal K (2023) IoT applications with cryptography and blockchain technology in healthcare digital twin design. IGI Global, Hershey, pp 220\u2013249. http:\/\/dx.doi.org\/10.4018\/978-1-6684-5376-6.ch009","DOI":"10.4018\/978-1-6684-5376-6.ch009"},{"key":"10805_CR127","doi-asserted-by":"publisher","unstructured":"Palensky P, Cvetkovic M, Gusain D, Joseph A (2022) Digital twins and their use in future power systems. Digit Twin 1:4. https:\/\/doi.org\/10.12688\/digitaltwin.17435.2","DOI":"10.12688\/digitaltwin.17435.2"},{"issue":"2","key":"10805_CR128","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1007\/s11831-022-09830-8","volume":"30","author":"Y Pan","year":"2023","unstructured":"Pan Y, Zhang L (2023) Integrating BIM and AI for smart construction management: current status and future directions. Arch Comput Methods Eng 30(2):1081\u20131110. https:\/\/doi.org\/10.1007\/s11831-022-09830-8","journal-title":"Arch Comput Methods Eng"},{"key":"10805_CR129","doi-asserted-by":"crossref","unstructured":"Panfilis SD, Gusmeroli S, Rodriguez J, Benedicto J (2018) FIWARE for Industry: a data-driven reference architecture. In: Enterprise interoperability. Wiley, New York, pp 171\u2013178","DOI":"10.1002\/9781119564034.ch21"},{"key":"10805_CR130","doi-asserted-by":"publisher","unstructured":"Paredes CM, t\u00ednez-Castro D, Ibarra-Junquera V, Gonz\u00e1lez-Potes A (2021) Detection and isolation of DoS and integrity cyber attacks in cyber-physical systems with a neural network-based architecture. Electronics 10(18):2238. https:\/\/doi.org\/10.3390\/electronics10182238","DOI":"10.3390\/electronics10182238"},{"issue":"4","key":"10805_CR131","doi-asserted-by":"publisher","first-page":"378","DOI":"10.3390\/electronics10040378","volume":"10","author":"A Partida","year":"2021","unstructured":"Partida A, Criado R, Romance M (2021) Identity and access management resilience against intentional risk for blockchain-based IOT platforms. Electronics 10(4):378. https:\/\/doi.org\/10.3390\/electronics10040378","journal-title":"Electronics"},{"key":"10805_CR132","doi-asserted-by":"publisher","unstructured":"Patel C, Pasikhani A, Gope P, Clark J (2024) User-empowered secure privacy-preserving authentication scheme for Digital Twin. Comput Secur 140:103793. https:\/\/doi.org\/10.1016\/j.cose.2024.103793","DOI":"10.1016\/j.cose.2024.103793"},{"issue":"19","key":"10805_CR133","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.3390\/electronics11193079","volume":"11","author":"S Patil","year":"2022","unstructured":"Patil S, Varadarajan V, Mazhar SM, Sahibzada A, Ahmed N, Sinha O et al (2022) Explainable artificial intelligence for intrusion detection system. Electronics 11(19):3079. https:\/\/doi.org\/10.3390\/electronics11193079","journal-title":"Electronics"},{"key":"10805_CR134","doi-asserted-by":"crossref","unstructured":"Paul B (2022) Internet of Things (IoT), three-layer architecture, security issues and counter measures. In: ICT analysis and applications. Springer, Singapore, pp 23\u201334","DOI":"10.1007\/978-981-16-5655-2_3"},{"key":"10805_CR135","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103558","volume":"134","author":"M Perno","year":"2022","unstructured":"Perno M, Hvam L, Haug A (2022) Implementation of digital twins in the process industry: a systematic literature review of enablers and barriers. Comput Ind 134:103558. https:\/\/doi.org\/10.1016\/j.compind.2021.103558","journal-title":"Comput Ind"},{"key":"10805_CR136","doi-asserted-by":"crossref","unstructured":"Pessoa MVP, Pires LF, Moreira JLR, Wu C (2022) Model-based digital threads for socio-technical systems. In: Intelligent systems reference library. Springer, Cham, pp 27\u201352","DOI":"10.1007\/978-3-030-97516-6_2"},{"key":"10805_CR137","doi-asserted-by":"crossref","unstructured":"Pirbhulal S, Abie H, Shukla A (2022) Towards a novel framework for reinforcing cybersecurity using digital twins in IoT-based healthcare applications. In: 2022 IEEE 95th vehicular technology conference (VTC2022-Spring). IEEE, New York","DOI":"10.1109\/VTC2022-Spring54318.2022.9860581"},{"key":"10805_CR138","doi-asserted-by":"crossref","unstructured":"Pires F, Souza M, Ahmad B, Leit\u00e3o P (2021) Decision support based on digital twin simulation: a case study. In: Service Oriented, holonic and multi-agent manufacturing systems for industry of the future. Springer, Cham, pp 99\u2013110","DOI":"10.1007\/978-3-030-69373-2_6"},{"key":"10805_CR139","doi-asserted-by":"publisher","unstructured":"Potgantwar A, Aggarwal S, Pant P, Rajawat AS, Chauhan C, Waghmare VN (2022) Secure aspect of digital twin for industry 4.0 application improvement using machine learning. SSRN Electron J. https:\/\/doi.org\/10.2139\/ssrn.4187977","DOI":"10.2139\/ssrn.4187977"},{"key":"10805_CR140","doi-asserted-by":"publisher","unstructured":"Pulyala SR (2023) The future of SIEM in a machine learning-driven cybersecurity landscape. Turk J Comput Math Educ (TURCOMAT) 14(03):1309\u20131314. https:\/\/doi.org\/10.61841\/turcomat.v14i03.14392","DOI":"10.61841\/turcomat.v14i03.14392"},{"key":"10805_CR141","doi-asserted-by":"publisher","DOI":"10.1016\/j.atech.2022.100094","volume":"3","author":"W Purcell","year":"2023","unstructured":"Purcell W, Neubauer T (2023) Digital twins in agriculture: a state-of-the-art review. Smart Agric Technol 3:100094. https:\/\/doi.org\/10.1016\/j.atech.2022.100094","journal-title":"Smart Agric Technol"},{"key":"10805_CR142","doi-asserted-by":"publisher","unstructured":"Putz B, Dietz M, Empl P, Pernul G (2021) EtherTwin: blockchain-based secure digital twin information management. Inf Process Manag 58(1):102425. https:\/\/doi.org\/10.1016\/j.ipm.2020.102425","DOI":"10.1016\/j.ipm.2020.102425"},{"issue":"2","key":"10805_CR143","doi-asserted-by":"publisher","first-page":"64","DOI":"10.3390\/fi14020064","volume":"14","author":"C Qian","year":"2022","unstructured":"Qian C, Liu X, Ripley C, Qian M, Liang F, Yu W (2022) Digital twin\u2014cyber replica of physical things: architecture, applications and future research directions. Future Internet 14(2):64. https:\/\/doi.org\/10.3390\/fi14020064","journal-title":"Future Internet."},{"key":"10805_CR144","doi-asserted-by":"crossref","unstructured":"Rani V, Kumar M, Mittal A, Kumar K (2022) Artificial intelligence for cybersecurity: recent advancements, challenges and opportunities. In: Robotics and AI for cybersecurity and critical infrastructure in smart cities. Springer, Cham, pp 73\u201388","DOI":"10.1007\/978-3-030-96737-6_4"},{"key":"10805_CR145","doi-asserted-by":"publisher","first-page":"32030","DOI":"10.1109\/access.2021.3060863","volume":"9","author":"MM Rathore","year":"2021","unstructured":"Rathore MM, Shah SA, Shukla D, Bentafat E, Bakiras S (2021) The role of AI, machine learning, and big data in digital twinning: a systematic literature review, challenges, and opportunities. IEEE Access 9:32030\u201332052. https:\/\/doi.org\/10.1109\/access.2021.3060863","journal-title":"IEEE Access."},{"key":"10805_CR146","doi-asserted-by":"publisher","unstructured":"Rocha-J\u00e1come C, Carvajal RG, Chavero FM, Guevara-Cabezas E, Fort EH (2021) Industry 4.0: a proposal of paradigm organization schemes from a systematic literature review. Sensors 22(1):66. https:\/\/doi.org\/10.3390\/s22010066","DOI":"10.3390\/s22010066"},{"issue":"22","key":"10805_CR147","doi-asserted-by":"publisher","first-page":"16231","DOI":"10.1109\/jiot.2021.3095308","volume":"8","author":"TK Rodrigues","year":"2021","unstructured":"Rodrigues TK, Liu J, Kato N (2021) Application of cybertwin for offloading in mobile multiaccess edge computing for 6G networks. IEEE Internet Things J 8(22):16231\u201316242. https:\/\/doi.org\/10.1109\/jiot.2021.3095308","journal-title":"IEEE Internet Things J"},{"key":"10805_CR148","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1016\/j.procir.2022.02.140","volume":"105","author":"B R\u00f6hm","year":"2022","unstructured":"R\u00f6hm B, Anderl R (2022) Simulation data management in the digital twin (SDM-DT)\u2014evolution of simulation data management along the product life cycle. Procedia CIRP 105:847\u2013850. https:\/\/doi.org\/10.1016\/j.procir.2022.02.140","journal-title":"Procedia CIRP."},{"key":"10805_CR149","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.trpro.2021.02.152","volume":"54","author":"A Rudskoy","year":"2021","unstructured":"Rudskoy A, Ilin I, Prokhorov A (2021) Digital twins in the intelligent transport systems. Transp Res Procedia 54:927\u2013935. https:\/\/doi.org\/10.1016\/j.trpro.2021.02.152","journal-title":"Transp Res Procedia"},{"key":"10805_CR150","doi-asserted-by":"crossref","unstructured":"Saeed MMA, Saeed RA, Ahmed ZE (2024) Data security and privacy in the age of AI and digital twins. IGI Global, Hershey, pp 99\u2013124","DOI":"10.4018\/979-8-3693-1818-8.ch008"},{"key":"10805_CR151","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.future.2020.07.015","volume":"113","author":"JC Sancho","year":"2020","unstructured":"Sancho JC, Caro A, \u00c1vila M, Bravo A (2020) New approach for threat classification and security risk estimations based on security event management. Futur Gener Comput Syst 113:488\u2013505. https:\/\/doi.org\/10.1016\/j.future.2020.07.015","journal-title":"Futur Gener Comput Syst"},{"key":"10805_CR152","doi-asserted-by":"publisher","unstructured":"San O, Pawar S, Rasheed A (2023) centralized digital twins of complex dynamical systems. Sci Rep. https:\/\/doi.org\/10.1038\/s41598-023-47078-9","DOI":"10.1038\/s41598-023-47078-9"},{"key":"10805_CR27","doi-asserted-by":"publisher","unstructured":"Sasikumar A, Vairavasundaram S, Kotecha K, V I, Ravi L, Selvachandran G et\u00a0al (2023) Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things. Future Gen Comput Syst 141:16\u201327. https:\/\/doi.org\/10.1016\/j.future.2022.11.002","DOI":"10.1016\/j.future.2022.11.002"},{"issue":"12","key":"10805_CR153","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/mc.2019.2942803","volume":"52","author":"R Saracco","year":"2019","unstructured":"Saracco R (2019) Digital twins: bridging physical space and cyberspace. Computer 52(12):58\u201364. https:\/\/doi.org\/10.1109\/mc.2019.2942803","journal-title":"Computer"},{"key":"10805_CR154","doi-asserted-by":"publisher","unstructured":"Saracco R, Henz P (2022) Special issue on digital twins\u2014part 1. IEEE Internet Comput 26(3):5\u20136. https:\/\/doi.org\/10.1109\/mic.2021.3088318","DOI":"10.1109\/mic.2021.3088318"},{"key":"10805_CR155","doi-asserted-by":"publisher","unstructured":"Scheibmeir J, Malaiya Y (2020) Multi-model security and social media analytics of the digital twin. Adv Sci Technol Eng Syst J 5(6), 323\u2013330. https:\/\/doi.org\/10.25046\/aj050639","DOI":"10.25046\/aj050639"},{"key":"10805_CR156","doi-asserted-by":"crossref","unstructured":"Scheuermann C, Binderberger T, von Frankenberg N, Werner A (2020) Digital twin: a machine learning approach to predict individual stress levels in extreme environments. In: Adjunct proceedings of the 2020 ACM International joint conference on pervasive and ubiquitous computing and proceedings of the 2020 ACM international symposium on wearable computers. UbiComp\/ISWC \u201920. ACM, New York","DOI":"10.1145\/3410530.3414316"},{"key":"10805_CR157","doi-asserted-by":"crossref","unstructured":"Seelaboyina R, Vadla SPC, Teerthala SA, Pedduri VV (2024) Secure software development life cycle: an approach to reduce the risks of cyber attacks in cyber physical systems and digital twins. Springer, Singapore, pp 153\u2013161","DOI":"10.1007\/978-981-99-7954-7_15"},{"issue":"2","key":"10805_CR158","doi-asserted-by":"publisher","first-page":"120","DOI":"10.3390\/buildings12020120","volume":"12","author":"M Shahzad","year":"2022","unstructured":"Shahzad M, Shafiq MT, Douglas D, Kassem M (2022) Digital twins in built environments: an investigation of the characteristics, applications, and challenges. Buildings 12(2):120. https:\/\/doi.org\/10.3390\/buildings12020120","journal-title":"Buildings"},{"key":"10805_CR159","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.future.2021.09.018","volume":"127","author":"SK Shandilya","year":"2022","unstructured":"Shandilya SK, Upadhyay S, Kumar A, Nagar AK (2022) AI-assisted computer network operations testbed for nature-inspired cyber security based adaptive defense simulation and analysis. Futur Gener Comput Syst 127:297\u2013308. https:\/\/doi.org\/10.1016\/j.future.2021.09.018","journal-title":"Futur Gener Comput Syst"},{"key":"10805_CR160","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108356","volume":"103","author":"DK Sharma","year":"2022","unstructured":"Sharma DK, Mishra J, Singh A, Govil R, Srivastava G, Lin JCW (2022) Explainable artificial intelligence for cybersecurity. Comput Electr Eng 103:108356. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108356","journal-title":"Comput Electr Eng"},{"key":"10805_CR161","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2022.100383","volume":"30","author":"A Sharma","year":"2022","unstructured":"Sharma A, Kosasih E, Zhang J, Brintrup A, Calinescu A (2022) Digital twins: state of the art theory and practice, challenges, and open research questions. J Ind Inf Integr 30:100383. https:\/\/doi.org\/10.1016\/j.jii.2022.100383","journal-title":"J Ind Inf Integr"},{"key":"10805_CR162","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102355","volume":"60","author":"M Shen","year":"2024","unstructured":"Shen M, Huang R (2024) Backdoor attacks with wavelet embedding: revealing and enhancing the insights of vulnerabilities in visual object detection models on transformers within digital twin systems. Adv Eng Inform 60:102355. https:\/\/doi.org\/10.1016\/j.aei.2024.102355","journal-title":"Adv Eng Inform"},{"key":"10805_CR163","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.jmsy.2021.09.014","volume":"61","author":"W Shen","year":"2021","unstructured":"Shen W, Hu T, Zhang C, Ma S (2021) Secure sharing of big digital twin data for smart manufacturing based on blockchain. J Manuf Syst 61:338\u2013350. https:\/\/doi.org\/10.1016\/j.jmsy.2021.09.014","journal-title":"J Manuf Syst"},{"key":"10805_CR164","doi-asserted-by":"crossref","unstructured":"Shi L, Krishnan S, Wen S (2022) Study cybersecurity of cyber physical system in the virtual environment: a survey and new direction. In: Australasian computer science week 2022. ACM, New York","DOI":"10.1145\/3511616.3513098"},{"key":"10805_CR165","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107145","volume":"156","author":"RJ Somers","year":"2023","unstructured":"Somers RJ, Douthwaite JA, Wagg DJ, Walkinshaw N, Hierons RM (2023) Digital-twin-based testing for cyber\u2013physical systems: a systematic literature review. Inf Softw Technol 156:107145. https:\/\/doi.org\/10.1016\/j.infsof.2022.107145","journal-title":"Inf Softw Technol"},{"key":"10805_CR166","doi-asserted-by":"publisher","first-page":"75365","DOI":"10.1109\/access.2022.3191414","volume":"10","author":"S Son","year":"2022","unstructured":"Son S, Kwon D, Lee J, Yu S, Jho NS, Park Y (2022) On the design of a privacy-preserving communication scheme for cloud-based digital twin environments using blockchain. IEEE Access 10:75365\u201375375. https:\/\/doi.org\/10.1109\/access.2022.3191414","journal-title":"IEEE Access."},{"key":"10805_CR167","doi-asserted-by":"publisher","unstructured":"Son BD, Hoa NT, Chien TV, Khalid W, Ferrag MA, Choi W, et\u00a0al (2024) Adversarial attacks and defenses in 6G network-assisted IoT systems. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/jiot.2024.3373808","DOI":"10.1109\/jiot.2024.3373808"},{"key":"10805_CR168","doi-asserted-by":"publisher","first-page":"107574","DOI":"10.1109\/access.2021.3100708","volume":"9","author":"B Sousa","year":"2021","unstructured":"Sousa B, Arieiro M, Pereira V, Correia J, Louren\u00e7o N, Cruz T (2021) ELEGANT: security of critical infrastructures with digital twins. IEEE Access 9:107574\u2013107588. https:\/\/doi.org\/10.1109\/access.2021.3100708","journal-title":"IEEE Access"},{"issue":"2","key":"10805_CR169","doi-asserted-by":"publisher","first-page":"758","DOI":"10.3390\/app13020758","volume":"13","author":"CL Stergiou","year":"2023","unstructured":"Stergiou CL, Bompoli E, Psannis KE (2023) Security and privacy issues in IoT-based big data cloud systems in a digital twin scenario. Appl Sci 13(2):758. https:\/\/doi.org\/10.3390\/app13020758","journal-title":"Appl Sci"},{"key":"10805_CR170","doi-asserted-by":"crossref","unstructured":"Stjepandi\u0107 J, Sommer M, Stobrawa S (2021) Digital twin: a conceptual view. Springer series in advanced manufacturing. Springer, Cham, pp 31\u201349","DOI":"10.1007\/978-3-030-77539-1_3"},{"issue":"3","key":"10805_CR171","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/mic.2021.3059320","volume":"26","author":"S Suhail","year":"2022","unstructured":"Suhail S, Hussain R, Jurdak R, Hong CS (2022) Trustworthy digital twins in the industrial Internet of Things with blockchain. IEEE Internet Comput 26(3):58\u201367. https:\/\/doi.org\/10.1109\/mic.2021.3059320","journal-title":"IEEE Internet Comput"},{"key":"10805_CR172","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2023.103961","volume":"151","author":"S Suhail","year":"2023","unstructured":"Suhail S, Iqbal M, Hussain R, Jurdak R (2023) ENIGMA: an explainable digital twin security solution for cyber-physical systems. Comput Ind 151:103961. https:\/\/doi.org\/10.1016\/j.compind.2023.103961","journal-title":"Comput Ind"},{"key":"10805_CR173","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1109\/ojcoms.2022.3197811","volume":"3","author":"F Tang","year":"2022","unstructured":"Tang F, Chen X, Rodrigues TK, Zhao M, Kato N (2022) Survey on digital twin edge networks (DITEN) toward 6G. IEEE Open J Commun Soc 3:1360\u20131381. https:\/\/doi.org\/10.1109\/ojcoms.2022.3197811","journal-title":"IEEE Open J Commun Soc"},{"key":"10805_CR174","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.jmsy.2022.06.015","volume":"64","author":"F Tao","year":"2022","unstructured":"Tao F, Xiao B, Qi Q, Cheng J, Ji P (2022) Digital twin modeling. J Manuf Syst 64:372\u2013389. https:\/\/doi.org\/10.1016\/j.jmsy.2022.06.015","journal-title":"J Manuf Syst"},{"key":"10805_CR175","doi-asserted-by":"publisher","unstructured":"Teisserenc B, asgozar S (2021) Adoption of blockchain technology through digital twins in the construction industry 4.0: a PESTELS approach. Buildings 11(12):670. https:\/\/doi.org\/10.3390\/buildings11120670","DOI":"10.3390\/buildings11120670"},{"key":"10805_CR176","unstructured":"Terry L (2022) End-to-end security in Azure. Microsoft. https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/end-to-end"},{"key":"10805_CR177","doi-asserted-by":"publisher","unstructured":"Thakur G, Kumar P, Deepika, Girala S, Das AK, Park Y (2023) An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment. IEEE Access 11:26877\u201326892. https:\/\/doi.org\/10.1109\/access.2023.3249116","DOI":"10.1109\/access.2023.3249116"},{"key":"10805_CR178","doi-asserted-by":"publisher","unstructured":"Thelen A, Zhang X, Fink O, Lu Y, Ghosh S, Youn BD et\u00a0al (2022) A comprehensive review of digital twin\u2014part 1: modeling and twinning enabling technologies. Struct Multidiscip Optim. https:\/\/doi.org\/10.1007\/s00158-022-03425-4","DOI":"10.1007\/s00158-022-03425-4"},{"key":"10805_CR179","doi-asserted-by":"crossref","unstructured":"Tsareva PE, Voronova AV (2022) Information security systems based on the AI and machine learning. In: 2022 Conference of Russian young researchers in electrical and electronic engineering (ElConRus). IEEE","DOI":"10.1109\/ElConRus54750.2022.9755581"},{"issue":"3","key":"10805_CR180","doi-asserted-by":"publisher","first-page":"563","DOI":"10.3390\/biomedinformatics3030039","volume":"3","author":"M Turab","year":"2023","unstructured":"Turab M, Jamil S (2023) A comprehensive survey of digital twins in healthcare in the era of metaverse. BioMedInformatics 3(3):563\u2013584. https:\/\/doi.org\/10.3390\/biomedinformatics3030039","journal-title":"BioMedInformatics"},{"key":"10805_CR181","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.procir.2022.05.044","volume":"107","author":"J Ulmer","year":"2022","unstructured":"Ulmer J, Braun S, Cheng CT, Dowey S, Wollert J (2022) Usage of digital twins for gamification applications in manufacturing. Procedia CIRP 107:675\u2013680. https:\/\/doi.org\/10.1016\/j.procir.2022.05.044","journal-title":"Procedia CIRP"},{"key":"10805_CR182","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100516","volume":"38","author":"MA Umer","year":"2022","unstructured":"Umer MA, Junejo KN, Jilani MT, Mathur AP (2022) Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations. Int J Crit Infrastruct Prot 38:100516. https:\/\/doi.org\/10.1016\/j.ijcip.2022.100516","journal-title":"Int J Crit Infrastruct Prot"},{"key":"10805_CR183","doi-asserted-by":"publisher","unstructured":"van\u00a0der Burg S, Kloppenburg S, Kok EJ, van\u00a0der Voort M (2021) Digital twins in agri-food: societal and ethical themes and questions for further research. NJAS Impact Agric Life Sci 93(1):98\u2013125. https:\/\/doi.org\/10.1080\/27685241.2021.1989269","DOI":"10.1080\/27685241.2021.1989269"},{"key":"10805_CR184","doi-asserted-by":"crossref","unstructured":"Vieira MN, Oliveira LP, Carneiro L (2022a) A comparative analysis of machine learning algorithms for distributed intrusion detection in IoT networks. In: Advanced information networking and applications. Springer, Cham, pp 249\u2013258","DOI":"10.1007\/978-3-030-99584-3_22"},{"key":"10805_CR185","doi-asserted-by":"publisher","unstructured":"Vieira J, tins JP, de\u00a0Almeida NM, Patr\u00edcio H, Morgado JG (2022b) Towards resilient and sustainable rail and road networks: a systematic literature review on digital twins. Sustainability 14(12):7060. https:\/\/doi.org\/10.3390\/su14127060","DOI":"10.3390\/su14127060"},{"key":"10805_CR186","doi-asserted-by":"crossref","unstructured":"Vielberth M, Glas M, Dietz M, Karagiannis S, Magkos E, Pernul G (2021) A digital twin-based cyber range for SOC analysts. Springer, Cham, pp 293\u2013311","DOI":"10.1007\/978-3-030-81242-3_17"},{"key":"10805_CR187","doi-asserted-by":"publisher","unstructured":"Vitthalrao MA (2020) Software vulnerability classification based on machine learning algorithm. Int J Adv Trends Comput Sci Eng 9(4):6653\u20136659. https:\/\/doi.org\/10.30534\/ijatcse\/2020\/358942020","DOI":"10.30534\/ijatcse\/2020\/358942020"},{"issue":"6","key":"10805_CR188","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1080\/20464177.2021.2024382","volume":"21","author":"JM Voth","year":"2022","unstructured":"Voth JM, Sturtevant GH (2022) Digital engineering: expanding the advantage. J Mar Eng Technol 21(6):355\u2013363. https:\/\/doi.org\/10.1080\/20464177.2021.2024382","journal-title":"J Mar Eng Technol"},{"key":"10805_CR189","doi-asserted-by":"publisher","unstructured":"Wan Z, Dong Y, Yu Z, Lv H, Lv Z (2021) Semi-supervised support vector machine for digital twins based brain image fusion. Front Neurosci. https:\/\/doi.org\/10.3389\/fnins.2021.705323","DOI":"10.3389\/fnins.2021.705323"},{"issue":"4","key":"10805_CR190","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/comst.2022.3201557","volume":"24","author":"Z Wang","year":"2022","unstructured":"Wang Z, Liu D, Sun Y, Pang X, Sun P, Lin F et al (2022a) A survey on IoT-enabled home automation systems: attacks and defenses. IEEE Commun Surv Tutor 24(4):2292\u20132328. https:\/\/doi.org\/10.1109\/comst.2022.3201557","journal-title":"IEEE Commun Surv Tutor"},{"key":"10805_CR191","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103134","volume":"66","author":"S Wang","year":"2022","unstructured":"Wang S, Li H, Chen J, Wang J, Deng Y (2022b) DAG blockchain-based lightweight authentication and authorization scheme for IoT devices. J Inf Secur Appl 66:103134. https:\/\/doi.org\/10.1016\/j.jisa.2022.103134","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"10805_CR192","doi-asserted-by":"publisher","DOI":"10.1016\/j.geits.2022.100014","volume":"1","author":"Y Wang","year":"2022","unstructured":"Wang Y, Kang X, Chen Z (2022c) A survey of Digital Twin techniques in smart manufacturing and management of energy applications. Green Energy Intell Transp 1(2):100014. https:\/\/doi.org\/10.1016\/j.geits.2022.100014","journal-title":"Green Energy Intell Transp"},{"issue":"17","key":"10805_CR193","doi-asserted-by":"publisher","first-page":"14965","DOI":"10.1109\/jiot.2023.3263909","volume":"10","author":"Y Wang","year":"2023","unstructured":"Wang Y, Su Z, Guo S, Dai M, Luan TH, Liu Y (2023a) A survey on digital twins: architecture, enabling technologies, security and privacy, and future prospects. IEEE Internet Things J 10(17):14965\u201314987. https:\/\/doi.org\/10.1109\/jiot.2023.3263909","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"10805_CR194","doi-asserted-by":"publisher","first-page":"3561","DOI":"10.1109\/jsac.2023.3310091","volume":"41","author":"H Wang","year":"2023","unstructured":"Wang H, Di X, Wang Y, Ren B, Gao G, Deng J (2023b) An intelligent digital twin method based on spatio-temporal feature fusion for IoT attack behavior identification. IEEE J Sel Areas Commun 41(11):3561\u20133572. https:\/\/doi.org\/10.1109\/jsac.2023.3310091","journal-title":"IEEE J Sel Areas Commun"},{"key":"10805_CR195","doi-asserted-by":"publisher","unstructured":"Wang Q, Wu W, Qian L, Cai Y, Qian J, Meng L (2023c) Design and implementation of secure and reliable information interaction architecture for digital twins. China Commun 20(2):79\u201393. https:\/\/doi.org\/10.23919\/jcc.2023.02.006","DOI":"10.23919\/jcc.2023.02.006"},{"issue":"7","key":"10805_CR196","doi-asserted-by":"publisher","first-page":"5215","DOI":"10.1007\/s10462-022-10143-2","volume":"55","author":"M Waqas","year":"2022","unstructured":"Waqas M, Tu S, Halim Z, Rehman SU, Abbas G, Abbas ZH (2022) The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges. Artif Intell Rev 55(7):5215\u20135261. https:\/\/doi.org\/10.1007\/s10462-022-10143-2","journal-title":"Artif Intell Rev"},{"issue":"10","key":"10805_CR197","doi-asserted-by":"publisher","first-page":"3318","DOI":"10.1109\/jsac.2023.3310105","volume":"41","author":"W Wei","year":"2023","unstructured":"Wei W, An B, Qiao K, Shen J (2023) A blockchain-based multi-users oblivious data sharing scheme for digital twin system in industrial Internet of Things. IEEE J Sel Areas Commun 41(10):3318\u20133332. https:\/\/doi.org\/10.1109\/jsac.2023.3310105","journal-title":"IEEE J Sel Areas Commun"},{"key":"10805_CR198","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107983","volume":"101","author":"J Wu","year":"2022","unstructured":"Wu J, Wang X, Dang Y, Lv Z (2022) Digital twins and artificial intelligence in transportation infrastructure: classification, application, and future research directions. Comput Electr Eng 101:107983. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107983","journal-title":"Comput Electr Eng"},{"key":"10805_CR199","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2023.104446","volume":"91","author":"ZY Wu","year":"2023","unstructured":"Wu ZY, Chew A, Meng X, Cai J, Pok J, Kalfarisi R et al (2023) High fidelity digital twin-based anomaly detection and localization for smart water grid operation management. Sustain Cities Soc 91:104446. https:\/\/doi.org\/10.1016\/j.scs.2023.104446","journal-title":"Sustain Cities Soc"},{"issue":"9","key":"10805_CR200","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3558052","volume":"55","author":"T Yoshizawa","year":"2023","unstructured":"Yoshizawa T, Singel\u00e9e D, Muehlberg JT, Delbruel S, Taherkordi A, Hughes D et al (2023) A Survey of Security and Privacy Issues in V2X Communication Systems. ACM Comput Surv 55(9):1\u201336. https:\/\/doi.org\/10.1145\/3558052","journal-title":"ACM Comput Surv"},{"issue":"6","key":"10805_CR201","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijdcf.286755","volume":"13","author":"L Yu","year":"2021","unstructured":"Yu L, Wang H, Li L, He H (2021) Towards automated detection of higher-order command injection vulnerabilities in IoT devices. Int J Digit Crime Forensics 13(6):1\u201314. https:\/\/doi.org\/10.4018\/ijdcf.286755","journal-title":"Int J Digit Crime Forensics"},{"issue":"1","key":"10805_CR202","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1080\/09540091.2021.2013443","volume":"34","author":"J Zhang","year":"2021","unstructured":"Zhang J, Tai Y (2021) Secure medical digital twin via human-centric interaction and cyber vulnerability resilience. Connect Sci 34(1):895\u2013910. https:\/\/doi.org\/10.1080\/09540091.2021.2013443","journal-title":"Connect Sci"},{"issue":"2","key":"10805_CR203","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1007\/s10462-021-09976-0","volume":"55","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J et al (2021) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev 55(2):1029\u20131053. https:\/\/doi.org\/10.1007\/s10462-021-09976-0","journal-title":"Artif Intell Rev"},{"issue":"7","key":"10805_CR204","doi-asserted-by":"publisher","first-page":"2100228","DOI":"10.1002\/aisy.202100228","volume":"4","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Wen F, Sun Z, Guo X, He T, Lee C (2022a) Artificial intelligence-enabled sensing technologies in the 5G\/Internet of Things era: from virtual reality\/mented reality to the digital twin. Adv Intell Syst 4(7):2100228. https:\/\/doi.org\/10.1002\/aisy.202100228","journal-title":"Adv Intell Syst"},{"key":"10805_CR205","doi-asserted-by":"publisher","first-page":"93104","DOI":"10.1109\/access.2022.3204051","volume":"10","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Hamadi HA, Damiani E, Yeun CY, Taher F (2022b) Explainable artificial intelligence applications in cyber security: state-of-the-art in research. IEEE Access 10:93104\u201393139. https:\/\/doi.org\/10.1109\/access.2022.3204051","journal-title":"IEEE Access"},{"key":"10805_CR206","doi-asserted-by":"publisher","unstructured":"Zhang J, Wei J, Zhang J, Bo C (2023a) CKAA: certificateless key-agreement authentication scheme in digital twin telemedicine environment. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.4922","DOI":"10.1002\/ett.4922"},{"key":"10805_CR207","doi-asserted-by":"publisher","unstructured":"Zhang Z, Yang W, Wu F, Li P (2023b) Privacy and integrity-preserving data aggregation scheme for wireless sensor networks digital twins. J Cloud Comput. https:\/\/doi.org\/10.1186\/s13677-023-00522-7","DOI":"10.1186\/s13677-023-00522-7"},{"issue":"6","key":"10805_CR208","doi-asserted-by":"publisher","first-page":"4317","DOI":"10.1007\/s11831-021-09609-3","volume":"28","author":"TI Zohdi","year":"2021","unstructured":"Zohdi TI (2021) A digital-twin and machine-learning framework for ventilation system optimization for capturing infectious disease respiratory emissions. Arch Comput Methods Eng 28(6):4317\u20134329. https:\/\/doi.org\/10.1007\/s11831-021-09609-3","journal-title":"Arch Comput Methods Eng"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-024-10805-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-024-10805-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-024-10805-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T05:09:56Z","timestamp":1723871396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-024-10805-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":208,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["10805"],"URL":"https:\/\/doi.org\/10.1007\/s10462-024-10805-3","relation":{},"ISSN":["1573-7462"],"issn-type":[{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"10 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"201"}}