{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:28Z","timestamp":1756273228151,"version":"3.44.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130117","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"626-631","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity-oriented Digital Twins: A Double-Edged Sword or a Game Changer?"],"prefix":"10.1109","author":[{"given":"Sani M.","family":"Abdullahi","sequence":"first","affiliation":[{"name":"M&#x00E6;rsk McKinney M&#x00F8;ller Institute, University of Southern Denmark,Campusvej 55,Odense,Denmark,5230"}]},{"given":"Sanja","family":"Lazarova-Molnar","sequence":"additional","affiliation":[{"name":"Institute AIFB, Karlsruhe Institute of Technology,Kaiserstr. 89,Karlsruhe,Germany,76133"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2494"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dibe.2024.100466"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3171465"},{"article-title":"Cybersecurity in Distributed Industrial Digital Twins: Threats, Defenses, and Key Takeaways","volume-title":"presented at the 1st International Workshop on Distributed Digital Twins","author":"Abdullahi","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/swc57546.2023.10449161"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-022-01075-0"},{"issue":"2","key":"ref8","doi-asserted-by":"crossref","first-page":"95","DOI":"10.3390\/info14020095","article-title":"Digital-Twin-Based Security Analytics for the Internet of Things","volume":"14","author":"Empl","year":"2023","journal-title":"Information"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/fes57669.2023.10182868"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407039"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93479-8_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ic-etite58242.2024.10493514"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10805-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app132413060"},{"article-title":"Digital Twins and Cybersecurity: Safeguarding the Future of Connected Systems (Nextgeneration Computing and Communication Engineering)","volume-title":"Wiley-Scrivener (in eng)","author":"Palanichamy","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00951-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13678-8_4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/csr61664.2024.10679442"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61569-6_15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14179-9_21"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/metroind4.0iot48571.2020.9138264"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/re48521.2020.00035"},{"key":"ref23","article-title":"Smart grid: Cyber attacks, critical defense approaches, and digital twin","author":"Zheng","year":"2022","journal-title":"arXiv preprint arXiv:2205.11783"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2020.3000958"},{"issue":"4","key":"ref25","doi-asserted-by":"crossref","first-page":"134","DOI":"10.3390\/fi16040134","article-title":"Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber-Physical Production Systems","volume":"16","author":"Jiang","year":"2024","journal-title":"Future Internet"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8334"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58687-3_8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s12024-024-00857-w"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/is.2018.8710526"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.012.2200373"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130117.pdf?arnumber=11130117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:15:32Z","timestamp":1756271732000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130117","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}