{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:13:06Z","timestamp":1762956786556,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001858","name":"Vinnova","doi-asserted-by":"publisher","award":["SSF RIT17-0032"],"award-info":[{"award-number":["SSF RIT17-0032"]}],"id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,7]]},"DOI":"10.1109\/etfa45728.2021.9613545","type":"proceedings-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:13:36Z","timestamp":1638317616000},"page":"01-08","source":"Crossref","is-referenced-by-count":14,"title":["A Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation"],"prefix":"10.1109","author":[{"given":"Fatemeh","family":"Akbarian","sequence":"first","affiliation":[{"name":"Lund University,Department of Electrical and Information Technology,Sweden"}]},{"given":"William","family":"T\u00e4rneberg","sequence":"additional","affiliation":[{"name":"Lund University,Department of Electrical and Information Technology,Sweden"}]},{"given":"Emma","family":"Fitzgerald","sequence":"additional","affiliation":[{"name":"Lund University,Department of Electrical and Information Technology,Sweden"}]},{"given":"Maria","family":"Kihl","sequence":"additional","affiliation":[{"name":"Lund University,Department of Electrical and Information Technology,Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref2","article-title":"Cyber-attack against ukrainian critical infrastructure","volume-title":"Cyber-security Infrastruct. Secur. Agency, Washington, DC, USA","author":"Alert","year":"2016"},{"volume-title":"Hatman-safety system targeted malware","year":"2017","key":"ref3"},{"journal-title":"Kaspersky Lab ICS-CERT","article-title":"Threat landscape for industrial automation systems in h2 2017","year":"2018","key":"ref4"},{"volume-title":"Cyber-attack, pings data systems of at least four gas networks","year":"2018","author":"Malik","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2019.0074"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922215"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2298195"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891261"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2341597"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18732-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198464"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264892"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/SoftCOM50211.2020.9238162"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364709"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/0470045345"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47943-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/UCC48980.2020.00025"},{"article-title":"Demonstration: A cloud-native digital twin with adaptive cloud-based control and intrusion detection","volume-title":"The Conference on Networked Systems (NetSys 2021)","author":"T\u00e4rneberg","key":"ref21"},{"volume-title":"Kubernetes","key":"ref22"},{"volume-title":"Ingress-nginx","key":"ref23"},{"volume-title":"Prometheus-operator","key":"ref24"}],"event":{"name":"2021 IEEE 26th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2021,9,7]]},"location":"Vasteras, Sweden","end":{"date-parts":[[2021,9,10]]}},"container-title":["2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9613137\/9613141\/09613545.pdf?arnumber=9613545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:15:55Z","timestamp":1725340555000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9613545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/etfa45728.2021.9613545","relation":{},"subject":[],"published":{"date-parts":[[2021,9,7]]}}}