{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:35:29Z","timestamp":1773513329501,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"German Federal Ministry for Economic Affairs and Climate Action (BMWK)","award":["SISSeC"],"award-info":[{"award-number":["SISSeC"]}]},{"name":"German Federal Ministry of Education and Research (BMBF)","award":["DEVISE"],"award-info":[{"award-number":["DEVISE"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3538975","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["SOAR4IoT: Securing IoT Assets with Digital Twins"],"prefix":"10.1145","author":[{"given":"Philip","family":"Empl","sequence":"first","affiliation":[{"name":"University of Regensburg, Germany"}]},{"given":"Daniel","family":"Schlette","sequence":"additional","affiliation":[{"name":"University of Regensburg, Germany"}]},{"given":"Daniel","family":"Zupfer","sequence":"additional","affiliation":[{"name":"University of Regensburg, Germany"}]},{"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[{"name":"University of Regensburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900125"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 12th. International Symposium on Tools and Methods of Competitive Engineering (TMCE\u201918)","author":"Boschert Stefan","unstructured":"Stefan Boschert, Christoph Heinrich, and R. Rosen. 2018. Next Generation Digital Twin. In Proceedings of the 12th. International Symposium on Tools and Methods of Competitive Engineering (TMCE\u201918) (Las Palmas de Gran Canaria, Spain), I.\u00a0Horvath, J.P. Suarez\u00a0Riviero, and P.M. Hernandez\u00a0Castellano (Eds.). 209\u2013218."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975920"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2796561"},{"key":"e_1_3_2_1_7_1","volume-title":"A digital twin architecture for security, privacy and safety. ERCIM News 115 Special Issue \u201dDigital Twins","author":"Damjanovic-Behrendt Violeta","year":"2018","unstructured":"Violeta Damjanovic-Behrendt. 2018. A digital twin architecture for security, privacy and safety. ERCIM News 115 Special Issue \u201dDigital Twins (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407039"},{"key":"e_1_3_2_1_9_1","volume-title":"Digital twins for cyber-physical systems security: State of the art and outlook. Security and quality in cyber-physical systems engineering","author":"Eckhart Matthias","year":"2019","unstructured":"Matthias Eckhart and Andreas Ekelhart. 2019. Digital twins for cyber-physical systems security: State of the art and outlook. Security and quality in cyber-physical systems engineering (2019), 383\u2013412."},{"key":"e_1_3_2_1_10_1","unstructured":"Matthias Eckhart Andreas Ekelhart and Roland Eisl. 2021. Digital Twins for Cyber-Physical Threat Detection and Response. ERCIM News 127(2021)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Janis Grabis Janis Stirna and Jelena Zdravkovic. 2021. A Capability Based Method for Development of Resilient Digital Services. In Enterprise Information Systems Joaquim Filipe Micha\u0142 \u015amia\u0142ek Alexander Brodsky and Slimane Hammoudi (Eds.). Vol.\u00a0417. 498\u2013516. https:\/\/doi.org\/10.1007\/978-3-030-75418-1_23","DOI":"10.1007\/978-3-030-75418-1_23"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3305268"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58923-3_11"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.514"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9376174"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21051809"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Savannah Norem Ashley\u00a0E Rice Samantha Erwin Robert\u00a0A Bridges Sean Oesch and Brian Weber. 2021. A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data. https:\/\/doi.org\/10.48550\/arXiv.2112.00100","DOI":"10.48550\/arXiv.2112.00100"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.242"},{"key":"e_1_3_2_1_23_1","unstructured":"OASIS. 2020. Open Command and Control (OpenC2) Language Specification Version 1.0 - Committee Specification 02. OASIS. https:\/\/docs.oasis-open.org\/openc2\/oc2ls\/v1.0\/cs02\/oc2ls-v1.0-cs02.html Last accessed 2021-11-20."},{"key":"e_1_3_2_1_24_1","unstructured":"OASIS. 2021. CACAO Security Playbooks Version 1.0 - Committee Specification 01. OASIS. https:\/\/docs.oasis-open.org\/cacao\/security-playbooks\/v1.0\/security-playbooks-v1.0.html Last accessed 2021-11-20."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126193"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2498900"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3117338"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49669-2_4"},{"key":"e_1_3_2_1_30_1","unstructured":"Tara Seils. 2021. IoT Attacks Skyrocket Doubling in 6 Months. https:\/\/threatpost.com\/iot-attacks-doubling\/169224\/. Last accessed 2021-02-21."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045514"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102098"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2022"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3538975","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3538975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:40Z","timestamp":1750183780000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3538975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":27,"alternative-id":["10.1145\/3538969.3538975","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3538975","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}