{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T17:40:44Z","timestamp":1769622044978,"version":"3.49.0"},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"This work was supported by the North-South Research Programme, which is delivered by the HEA on behalf of DFHERIS and the Shared Island Unit at the Department of the Taoiseach.","award":["North-South Research Programme"],"award-info":[{"award-number":["North-South Research Programme"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>Seeking more secure and effective digital representations.<\/jats:p>","DOI":"10.1145\/3631539","type":"journal-article","created":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T13:10:41Z","timestamp":1703164241000},"page":"39-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers"],"prefix":"10.1145","volume":"67","author":[{"given":"Sabah","family":"Suhail","sequence":"first","affiliation":[{"name":"Queen's University Belfast, U.K"}]},{"given":"Mubashar","family":"Iqbal","sequence":"additional","affiliation":[{"name":"University of Tartu, Estonia"}]},{"given":"Raja","family":"Jurdak","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,12,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3171465"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25312-7_14"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirpj.2020.02.002"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep44499"},{"key":"e_1_2_1_5_1","volume-title":"Dragos Inc., (Mar.","author":"Lee R.M.","year":"2017","unstructured":"Lee, R.M. et al. Crashoverride: Analysis of the threat to electric grid operations. Dragos Inc., (Mar. 2017)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2023.103961"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2873186"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631539","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3631539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:03:33Z","timestamp":1755972213000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,21]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1145\/3631539"],"URL":"https:\/\/doi.org\/10.1145\/3631539","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,21]]},"assertion":[{"value":"2023-12-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}