{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T09:01:49Z","timestamp":1774083709859,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100014833","name":"Cyber Security Research Centre Limited","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014833","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003327","name":"Australian Government's Cooperative Research Centres Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003327","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1109\/seeda-cecnsm53056.2021.9566277","type":"proceedings-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T00:30:59Z","timestamp":1634689859000},"page":"1-8","source":"Crossref","is-referenced-by-count":80,"title":["Digital Twins and Cyber Security \u2013 solution or challenge?"],"prefix":"10.1109","author":[{"given":"David","family":"Holmes","sequence":"first","affiliation":[]},{"given":"Maria","family":"Papathanasaki","sequence":"additional","affiliation":[]},{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[]},{"given":"Mohamed Amine","family":"Ferrag","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"1","article-title":"RECLAIM: Toward a New Era of Refurbishment and Remanufacturing of Industrial Equipment","volume":"3","author":"zacharaki","year":"2021","journal-title":"Frontiers in Artificial Intellingence"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.06.141"},{"key":"ref31","author":"maschler","year":"2020","journal-title":"Transfer Learning as an Enabler of the Intelligent Digital Twin"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/electronics4040995"},{"key":"ref35","year":"0","journal-title":"IOTA Ecosystem Project-Industrial IOTA Lab Aachen"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2019.8706111"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2019.8706111"},{"key":"ref11","article-title":"The Next Step-IEEE 1451 Smart Sensor Networks","volume":"18","author":"moore","year":"2017","journal-title":"NIST"},{"key":"ref12","first-page":"2600","article-title":"Proceedings of the 2014 Winter Simulation Conference A. Tolk, S","author":"sprock","year":"2014","journal-title":"Winter Simul Conf"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WSC40007.2019.9004659"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953499"},{"key":"ref15","year":"0","journal-title":"DIGIPREDICT Project"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103469"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirpj.2020.02.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2020.02.084"},{"key":"ref19","first-page":"34","author":"oscar","year":"2019","journal-title":"The Digital Shop Floor in the Industry 4 0 Era"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392199"},{"key":"ref4","first-page":"85","article-title":"Digital twin: Mitigating unpredictable, undesirable emergent behavior in complex systems","author":"grieves","year":"2016","journal-title":"Transdiscipl Perspect Complex Syst New Find Approaches"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2998723"},{"key":"ref3","year":"0","journal-title":"Definition of Digital Twin-Gartner Information Technology Glossary"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.AMS.400-2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/0470045345"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.08.474"},{"key":"ref8","year":"0","journal-title":"ISO\/DIS 23247-1(en) Automation systems and integration-Digital Twin framework for manufacturing-Part 1 Overview and general principles"},{"key":"ref7","first-page":"1","year":"2019","journal-title":"the Asset Administration Shell Implementing Digital Twins for Use in Industrie 4 0 the Asset Administration Shell-a Starter Kit for Developers"},{"key":"ref2","year":"0","journal-title":"The Colonial Pipeline Ransomware Attack Everything We Know | Votiro"},{"key":"ref9","year":"0","journal-title":"P2806-System Architecture of Digital Representation for Physical Objects in Factory Environments"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/SoftCOM50211.2020.9238162"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.glt.2018.12.001"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.ifacol.2015.06.141","article-title":"About the importance of autonomy and digital twins for the future of manufacturing","volume":"48","author":"rosen","year":"2015","journal-title":"IFAC-PapersOnLine"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.023121167"},{"key":"ref24","year":"0","journal-title":"Emerging Technology Guide Digital Twin Digital NSW"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198464"},{"key":"ref26","article-title":"A three-tiered intrusion detection system for industrial control systems","volume":"7","author":"anthi","year":"2021","journal-title":"Cybersecurity"},{"key":"ref25","article-title":"Cybersecurity considerations for digital twin implementations","author":"hearn","year":"2019","journal-title":"IIC Journal of Innovation"}],"event":{"name":"2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)","location":"Preveza, Greece","start":{"date-parts":[[2021,9,24]]},"end":{"date-parts":[[2021,9,26]]}},"container-title":["2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9565881\/9565882\/09566277.pdf?arnumber=9566277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:31Z","timestamp":1652197651000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9566277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/seeda-cecnsm53056.2021.9566277","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]}}}