{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:56:34Z","timestamp":1759334194413,"version":"build-2065373602"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:00:00Z","timestamp":1757462400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:00:00Z","timestamp":1757462400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,10]]},"DOI":"10.1109\/fdl68117.2025.11165407","type":"proceedings-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T17:24:10Z","timestamp":1758648250000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Digital Twin and Digital Thread for System Security and Performance applied to an Electrical Vehicle Charging Use Case"],"prefix":"10.1109","author":[{"given":"Hagen","family":"Heermann","sequence":"first","affiliation":[{"name":"University of Kaiserslautern-Landau,Cyber-Physical Systems Chair,Kaiserslautern,Germany"}]},{"given":"Johannes","family":"Koch","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern-Landau,Cyber-Physical Systems Chair,Kaiserslautern,Germany"}]},{"given":"Christoph","family":"Grimm","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern-Landau,Cyber-Physical Systems Chair,Kaiserslautern,Germany"}]},{"given":"Daniela","family":"Genius","sequence":"additional","affiliation":[{"name":"Sorbonne Universit&#x00E9;,LIP6 Laboratory,Paris,France"}]},{"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris,LTCI, T&#x00E9;l&#x00E9;com Paris,Sophia-Antipolis,France"}]},{"given":"Ahlem","family":"Mifdaoui","sequence":"additional","affiliation":[{"name":"University of Toulouse,ISAE-Supaero,Toulouse,France"}]},{"given":"Klaus","family":"Schneider","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern-Landau,Embedded Systems Chair,Kaiserslautern,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-024-00603-w"},{"article-title":"Smart grid: Cyber attacks, critical defense approaches, and digital twin","year":"2022","author":"Zheng","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/app132413060"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3670470"},{"key":"ref5","first-page":"293","volume-title":"Model-Driven Engineering and Software Development","author":"Apvrille","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2514\/1.i010950"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38821-7_10"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3131662"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/DATE64628.2025.10993201"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSCPES55116.2022.9770147"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45318-0","volume-title":"Network Calculus","volume":"2050","author":"Le Boudec","year":"2001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3180763"},{"key":"ref14","article-title":"Introduction to the SysML v2 Language \u2013 Textual Notation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE62659.2024.10620947"},{"article-title":"Virtual yet precise prototyping: An automotive case study","volume-title":"ERTSS\u20192016","author":"Genius","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00866-1"},{"article-title":"Tool support for precise assessment of software security\/performance tradeoffs (extended abstract)","volume-title":"Conference on Application of Concurrency to System Design (ACSD)","author":"Rayon-Richter","key":"ref18"},{"article-title":"Yet another experience on tsn tools interoperability for critical embedded networks","volume-title":"ERTS2024","author":"Cuenot","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2010.5686958"},{"article-title":"Averest: Specification, verification, and implementation of reactive systems","volume-title":"Conference on Application of Concurrency to System Design (ACSD)","author":"Schneider","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN58382.2024.10774476"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0006535902950302"}],"event":{"name":"2025 Forum on Specification &amp; Design Languages (FDL)","start":{"date-parts":[[2025,9,10]]},"location":"St. Goar, Germany","end":{"date-parts":[[2025,9,12]]}},"container-title":["2025 Forum on Specification &amp;amp; Design Languages (FDL)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11165265\/11165266\/11165407.pdf?arnumber=11165407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T13:47:55Z","timestamp":1759240075000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11165407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/fdl68117.2025.11165407","relation":{},"subject":[],"published":{"date-parts":[[2025,9,10]]}}}