{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T06:39:55Z","timestamp":1772087995212,"version":"3.50.1"},"reference-count":137,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T00:00:00Z","timestamp":1771286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP220101516"],"award-info":[{"award-number":["DP220101516"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The rapid advancement of Industry 5.0 and the concurrent growth of the Industrial Internet of Things (IIoT) present significant cybersecurity challenges necessitating advanced solutions. Digital Twin technology, which enables the creation of near-perfect digital replicas of physical systems, offers a promising approach to enhancing security and safety. This paper presents a literature review of the existing research to identify the challenges and future directions for integrating DT technology into IIoT from a security perspective. We aim to establish a comprehensive understanding of emerging features, including predictive analytics, real-time threat detection, and cybersecurity management. Additionally, this review highlights critical gaps, including complexity, model fidelity, real-time data processing, and scalability, which hinder the successful deployment of DT technology. Our study will assist researchers, cybersecurity practitioners, and policymakers in understanding the potential, limitations, and future advancements of this crucial area.<\/jats:p>","DOI":"10.3390\/info17020209","type":"journal-article","created":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T09:22:46Z","timestamp":1771320166000},"page":"209","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing IIoT Security Using Digital Twins in Industry 5.0: A Systematic Literature Review"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2822-0657","authenticated-orcid":false,"given":"Md","family":"Whaiduzzaman","sequence":"first","affiliation":[{"name":"Centre for Artificial Intelligence Research and Optimisation (AIRO), Torrens University, Ultimo 2007, Australia"},{"name":"School of Information Systems, Queensland University of Technology, Brisbane 4000, Australia"}]},{"given":"Natasha Tanzila","family":"Monalisa","sequence":"additional","affiliation":[{"name":"School of Information Systems, Queensland University of Technology, Brisbane 4000, Australia"}]},{"given":"Shinthi Tasnim","family":"Himi","sequence":"additional","affiliation":[{"name":"School of Information Systems, Queensland University of Technology, Brisbane 4000, Australia"}]},{"given":"Shirin","family":"Sultana","sequence":"additional","affiliation":[{"name":"Hertfordshire Business School, University of Hertfordshire, Hatfield AL10 9AB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3114-8978","authenticated-orcid":false,"given":"Tony","family":"Jan","sequence":"additional","affiliation":[{"name":"Centre for Artificial Intelligence Research and Optimisation (AIRO), Torrens University, Ultimo 2007, Australia"}]},{"given":"Alistair","family":"Barros","sequence":"additional","affiliation":[{"name":"School of Information Systems, Queensland University of Technology, Brisbane 4000, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2026,2,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/JSYST.2023.3270620","article-title":"Industrial internet of things: A review of improvements over traditional SCADA systems for Industrial Automation","volume":"18","author":"Babayigit","year":"2024","journal-title":"IEEE Syst. J."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Hassan, M.A., Zardari, S., Farooq, M.U., Alansari, M.M., and Nagro, S.A. (2024). Systematic analysis of risks in industry 5.0 architecture. Appl. Sci., 14.","DOI":"10.3390\/app14041466"},{"key":"ref_3","unstructured":"European Union Agency for Cybersecurity (ENISA) (2025, February 01). 2024 Report on the State of the Cybersecurity in the Union. Available online: https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2024-11\/2024%20Report%20on%20the%20State%20of%20the%20Cybersecurity%20in%20the%20Union.pdf."},{"key":"ref_4","unstructured":"(2025, February 01). Zurich Resilience Solutions. Cyber Attacks on Critical Infrastructure Pose Major Risk to Communities. Available online: https:\/\/www.zurichresilience.com\/knowledge-and-insights-hub\/articles\/cyber-attacks-on-critical-infrastructure-pose-major-risk-to-communities."},{"key":"ref_5","unstructured":"Office of Management and Budget (2025, February 01). Moving the U.S. Government Toward Zero Trust Cybersecurity Principles, Available online: https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/01\/M-22-09.pdf."},{"key":"ref_6","unstructured":"Kitchenham, B., and Charters, S. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering, Durham University. Technical Report EBSE 2007-001."},{"key":"ref_7","unstructured":"CEBMa (2025, February 01). What Is a PICOC?. Available online: https:\/\/cebma.org\/resources\/frequently-asked-questions\/what-is-a-picoc\/."},{"key":"ref_8","first-page":"147","article-title":"Industrial revolution and scientific and technological progress","volume":"38","author":"Fremdling","year":"1997","journal-title":"Jahrb. Wirtsch. Econ. Hist. Yearb."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"100398","DOI":"10.1016\/j.dajour.2024.100398","article-title":"Digital Twins and Industrial Internet of Things: Uncovering operational intelligence in industry 4.0","volume":"10","author":"Attaran","year":"2024","journal-title":"Decis. Anal. J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1109\/TEM.2022.3144881","article-title":"The role of External Actors in SMEs\u2019 Human-Centered Industry 4.0 adoption: An Empirical perspective on Italian Competence centers","volume":"71","author":"Ietto","year":"2024","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"124044","DOI":"10.1016\/j.jclepro.2020.124044","article-title":"A study of literature in modular integrated construction\u2014Critical review and future directions","volume":"277","author":"Abdelmageed","year":"2020","journal-title":"J. Clean. Prod."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"114946","DOI":"10.1016\/j.apenergy.2020.114946","article-title":"Material and energy flows of the iron and steel industry: Status quo, challenges and perspectives","volume":"268","author":"Sun","year":"2020","journal-title":"Appl. Energy"},{"key":"ref_13","first-page":"1904","article-title":"Birth of Industry 5.0: \u201cThe Internet of Things\u201d and next-generation technology policy","volume":"11","author":"Tripathy","year":"2020","journal-title":"Int. J. Adv. Res. Eng. Technol. (IJARET)"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1108\/SCM-03-2018-0148","article-title":"Understanding blockchain technology for future supply chains: A systematic literature review and research agenda","volume":"24","author":"Wang","year":"2019","journal-title":"Supply Chain Manag. Int. J."},{"key":"ref_15","first-page":"507","article-title":"Industry 5.0: Potential applications in COVID-19","volume":"5","author":"Javaid","year":"2020","journal-title":"J. Ind. Integr. Manag."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Martos, V., Ahmad, A., Cartujo, P., and Ordo\u00f1ez, J. (2021). Ensuring Agricultural Sustainability through Remote Sensing in the Era of Agriculture 5.0. Appl. Sci., 11.","DOI":"10.3390\/app11135911"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"20200360","DOI":"10.1098\/rsta.2020.0360","article-title":"Industrial applications of Digital Twins","volume":"379","author":"Jiang","year":"2021","journal-title":"Philos. Trans. R. Soc. A Math. Phys. Eng. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"101837","DOI":"10.1016\/j.rcim.2019.101837","article-title":"Digital twin-driven smart manufacturing: Connotation, erence model, applications and research issues","volume":"61","author":"Lu","year":"2020","journal-title":"Robot. Comput.-Integr. Manuf."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Rojek, I., Miko\u0142ajewski, D., and Dostatni, E. (2020). Digital Twins in product lifecycle for sustainability in manufacturing and maintenance. Appl. Sci., 11.","DOI":"10.3390\/app11010031"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Abburu, S., Berre, A.J., Jacoby, M., Roman, D., Stojanovic, L., and Stojanovic, N. (2020, January 15\u201317). COGNITWIN\u2014Hybrid and cognitive digital twins for the process industry. Proceedings of the 2020 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC), Cardiff, UK.","DOI":"10.1109\/ICE\/ITMC49519.2020.9198403"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Chen, H., Jeremiah, S.R., Lee, C., and Park, J.H. (2023). A Digital Twin-Based Heuristic Multi-Cooperation Scheduling Framework for Smart Manufacturing in IIoT Environment. Appl. Sci., 13.","DOI":"10.3390\/app13031440"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"119986","DOI":"10.1016\/j.apenergy.2022.119986","article-title":"Digital Twin and Big Data-Driven Sustainable Smart Manufacturing Based on Information Management Systems for Energy-Intensive Industries","volume":"326","author":"Ma","year":"2022","journal-title":"Appl. Energy"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"16749","DOI":"10.1109\/JIOT.2021.3051158","article-title":"Digital Twin for Intelligent Context-Aware IoT Healthcare Systems","volume":"8","author":"Elayan","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"50523","DOI":"10.1109\/ACCESS.2022.3173617","article-title":"A Blockchain Based System for Healthcare Digital Twin","volume":"10","author":"Akash","year":"2022","journal-title":"IEEE Access"},{"key":"ref_25","first-page":"31","article-title":"Metaverse Platforms for Immersive Healthcare: A Survey on Telemedicine Solutions","volume":"58","author":"Jagatheesaperumal","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"167653","DOI":"10.1109\/ACCESS.2019.2953499","article-title":"A survey on digital twin: Definitions, characteristics, applications, and design implications","volume":"7","author":"Barricelli","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"104175","DOI":"10.1109\/ACCESS.2020.2998723","article-title":"Digital twin for the oil and gas industry: Overview, research trends, opportunities, and challenges","volume":"8","author":"Wanasinghe","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"100213","DOI":"10.1016\/j.egyai.2022.100213","article-title":"Towards Electric Digital Twin Grid: Technology and Framework Review","volume":"11","author":"Sifat","year":"2023","journal-title":"Energy AI"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1109\/JRFID.2024.3404563","article-title":"A reduced-order digital twin fpga-based implementation with self-awareness capabilities for power electronics applications","volume":"8","author":"Nwoke","year":"2024","journal-title":"IEEE J. Radio Freq. Identif."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"147406","DOI":"10.1109\/ACCESS.2019.2946515","article-title":"Digital Twin: Vision, benefits, boundaries, and creation for buildings","volume":"7","author":"Khajavi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MIC.2021.3060962","article-title":"DUET: A framework for building interoperable and trusted digital twins of smart cities","volume":"26","author":"Raes","year":"2021","journal-title":"IEEE Internet Comput."},{"key":"ref_32","first-page":"100413","article-title":"A Survey on Digital Twin and its Applications","volume":"40","author":"Kaur","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1016\/j.matpr.2021.09.249","article-title":"Role of smart materials and digital twin (DT) for the adoption of electric vehicles in India","volume":"52","author":"Kamran","year":"2022","journal-title":"Mater. Today Proc."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Piromalis, D., and Kantaros, A. (2022). Digital Twins in the Automotive Industry: The Road toward Physical-Digital Convergence. Appl. Syst. Innov., 5.","DOI":"10.3390\/asi5040065"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.eng.2019.01.014","article-title":"Digital Twins and Cyber\u2013Physical Systems toward Smart Manufacturing and Industry 4.0: Correlation and Comparison","volume":"5","author":"Tao","year":"2019","journal-title":"Engineering"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Omrany, H., Mehdipour, A., and Oteng, D. (2024). Digital twin technology and social sustainability: Implications for the construction industry. Sustainability, 16.","DOI":"10.3390\/su16198663"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"110418","DOI":"10.1016\/j.cie.2024.110418","article-title":"Cognitive digital twin-enabled multi-robot collaborative manufacturing: Framework and approaches","volume":"194","author":"Xu","year":"2024","journal-title":"Comput. Ind. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Nasirahmadi, A., and Hensel, O. (2022). Toward the next generation of digitalization in agriculture based on digital twin paradigm. Sensors, 22.","DOI":"10.3390\/s22020498"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Monteiro, J., Barata, J., Veloso, M., Veloso, L., and Nunes, J. (2018, January 24\u201326). Towards sustainable digital twins for vertical farming. Proceedings of the 2018 Thirteenth International Conference on Digital Information Management (ICDIM), Berlin, Germany.","DOI":"10.1109\/ICDIM.2018.8847169"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"101646","DOI":"10.1016\/j.pmcj.2022.101646","article-title":"Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments","volume":"85","author":"Bellavista","year":"2022","journal-title":"Pervasive Mob. Comput."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.jmsy.2020.06.017","article-title":"Review of Digital Twin about Concepts, Technologies, and Industrial Applications","volume":"58","author":"Liu","year":"2021","journal-title":"J. Manuf. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"5452","DOI":"10.1109\/OJCOMS.2024.3447472","article-title":"Colosseum: The open RAN digital twin","volume":"5","author":"Polese","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Pisani, J., Cavone, G., Pascucci, F., and Giarr\u00e9, L. (2023, January 6\u20138). Using Digital Twin to Detect Cyber-Attacks in Industrial Control Systems. Proceedings of the IEEE EUROCON 2023\u201420th International Conference on Smart Technologies, Torino, Italy.","DOI":"10.1109\/EUROCON56442.2023.10198927"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"108061","DOI":"10.1016\/j.compeleceng.2022.108061","article-title":"An electric power digital twin for cyber security testing, research and education","volume":"101","author":"Kandasamy","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"103888","DOI":"10.1016\/j.jnca.2024.103888","article-title":"Digital twin-driven secured edge-private cloud Industrial Internet of Things (IIoT) framework","volume":"226","author":"Hossain","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"111921","DOI":"10.1016\/j.solener.2023.111921","article-title":"Digital twin-driven SDN for smart grid: A deep learning integrated blockchain for cybersecurity","volume":"263","author":"Kumar","year":"2023","journal-title":"Sol. Energy"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Grasselli, C., Melis, A., Rinieri, L., Berardi, D., Gori, G., and Sadi, A. (2022, January 19\u201322). An Industrial Network Digital Twin for enhanced security of Cyber-Physical Systems. Proceedings of the 2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China.","DOI":"10.1109\/ISNCC55209.2022.9851731"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1109\/TASE.2023.3243147","article-title":"Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems","volume":"21","author":"Balta","year":"2024","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"69160","DOI":"10.1109\/ACCESS.2022.3186892","article-title":"Blockchain for Industry 5.0: Vision, opportunities, key enablers, and future directions","volume":"10","author":"Verma","year":"2022","journal-title":"IEEE Access"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Gupta, D., Moni, S., and Tosun, A. (2023, January 6\u201310). Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things. Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Gdansk, Poland.","DOI":"10.1145\/3599957.3606250"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Coppolino, L., Nardone, R., Petruolo, A., and Romano, L. (2023). Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces. Appl. Sci., 13.","DOI":"10.3390\/app132413060"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Danilczyk, W., Sun, Y., and He, H. (2019, January 13\u201315). ANGEL: An Intelligent Digital Twin Framework for Microgrid Security. Proceedings of the 2019 North American Power Symposium (NAPS), Wichita, KS, USA.","DOI":"10.1109\/NAPS46351.2019.9000371"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Varghese, S., Ghadim, A., Balador, A., Alimadadi, Z., and Papadimitratos, P. (2022, January 21\u201325). Digital twin-based intrusion detection for industrial control systems. Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops), Pisa, Italy.","DOI":"10.1109\/PerComWorkshops53856.2022.9767492"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"519","DOI":"10.3390\/jcp1030026","article-title":"Augmented reality and the digital twin: State-of-the-Art and Perspectives for Cybersecurity","volume":"1","author":"Dietz","year":"2021","journal-title":"J. Cybersecur. Priv."},{"key":"ref_55","unstructured":"Norton, B., and Normann, M. (June, January 31). Digital Twins and Semantic Data Fusion for Security in a Healthcare Environment. Proceedings of the International Workshop on Semantic Digital Twins Co-Located with the 17th Extended Semantic Web Conference, SeDiT@ESWC, Heraklion, Greece."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Atalay, M., and Angin, P. (2020, January 3\u20135). A Digital Twins Approach to Smart Grid Security Testing and Standardization. Proceedings of the 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, Roma, Italy.","DOI":"10.1109\/MetroInd4.0IoT48571.2020.9138264"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Mohsin, A., Janicke, H., Nepal, S., and Holmes, D. (2023, January 1\u20134). Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations. Proceedings of the 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA.","DOI":"10.1109\/TPS-ISA58951.2023.00042"},{"key":"ref_58","first-page":"8","article-title":"Applying Digital Twins in Metaverse: User Interface, Security and Privacy Challenges","volume":"2","author":"Far","year":"2022","journal-title":"J. Metaverse"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.jmsy.2023.08.023","article-title":"Towards resilience in Industry 5.0: A decentralized autonomous manufacturing paradigm","volume":"71","author":"Leng","year":"2023","journal-title":"J. Manuf. Syst."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Spyrou, O., Ariza-Sent\u00eds, M., and V\u00e9lez, S. (2025). Enhancing Education in Agriculture via XR-Based Digital Twins: A Novel Approach for the Next Generation. Appl. Syst. Innov., 8.","DOI":"10.3390\/asi8020038"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Eckhart, M., and Ekelhart, A. (2019). Digital Twins for Cyber-Physical Systems Security: State of the art and outlook. Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb, Springer. Springer eBooks.","DOI":"10.1007\/978-3-030-25312-7_14"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Eckhart, M., Ekelhart, A., and Weippl, E. (2019, January 10\u201313). Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. Proceedings of the 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Zaragoza, Spain.","DOI":"10.1109\/ETFA.2019.8869197"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Wang, W., Ding, J., Lu, X., and Jing, Y. (2024). Leveraging digital twin technology for enhanced cybersecurity in Cyber\u2013Physical production systems. Future Internet, 16.","DOI":"10.3390\/fi16040134"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Stergiou, C., Bompoli, E., and Psannis, K. (2023). Security and privacy issues in IoT-Based big data cloud systems in a digital twin scenario. Appl. Sci., 13.","DOI":"10.3390\/app13020758"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"323","DOI":"10.25046\/aj050639","article-title":"Multi-Model security and social media analytics of the digital twin","volume":"5","author":"Scheibmeir","year":"2020","journal-title":"Adv. Sci. Technol. Eng. Syst. J."},{"key":"ref_66","unstructured":"Allison, D., Smith, P., and Mclaughlin, K. (September, January 29). Digital Twin-Enhanced Incident Response for Cyber-Physical Systems. Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES \u201923), Benevento, Italy."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/3582571","article-title":"Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems","volume":"32","author":"Xu","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Cha, H., Yang, H., Song, Y., and Kang, A. (2023). Intelligent Anomaly Detection System through Malware Image Augmentation in IIoT Environment Based on Digital Twin. Appl. Sci., 13.","DOI":"10.3390\/app131810196"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"11553","DOI":"10.1109\/TII.2023.3246983","article-title":"Digital Twins for anomaly detection in the industrial Internet of Things: Conceptual Architecture and Proof-of-Concept","volume":"19","author":"Flammini","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., and Canberk, B. (2023, January 4\u20138). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things networks. Proceedings of the 2023 IEEE Globecom Workshops (GC Wkshps), Kuala Lumpur, Malaysia.","DOI":"10.1109\/GCWkshps58843.2023.10465218"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Holmes, D., Papathanasaki, M., Maglaras, L., Ferrag, M., Nepal, S., and Janicke, H. (2021, January 24\u201326). Digital twins and cyber security\u2014Solution or challenge?. Proceedings of the 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Preveza, Greece.","DOI":"10.1109\/SEEDA-CECNSM53056.2021.9566277"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"114013","DOI":"10.1109\/ACCESS.2023.3324371","article-title":"DTITD: An intelligent insider threat detection framework based on digital twin and Self-Attention based deep learning models","volume":"11","author":"Wang","year":"2023","journal-title":"IEEE Access"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Akbarian, F., Fitzgerald, E., and Kihl, M. (2020, January 17\u201319). Intrusion detection in digital twins for industrial control systems. Proceedings of the 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Hvar, Croatia.","DOI":"10.23919\/SoftCOM50211.2020.9238162"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Becue, A., Fourastier, Y., Praca, I., Savarit, A., Baron, C., Gradussofs, B., Pouille, E., and Thomas, C. (2018, January 13\u201315). CyberFactory#1\u2014Securing the industry 4.0 with cyber-ranges and digital twins. Proceedings of the 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), Imperia, Italy.","DOI":"10.1109\/WFCS.2018.8402377"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Vielberth, M., Glas, M., Dietz, M., Karagiannis, S., Magkos, E., and Pernul, G. (2021). A digital Twin-Based cyber range for SOC analysts. IFIP Annual Conference on Data and Applications Security and Privacy; Lecture Notes in Computer Science, Springer International Publishing.","DOI":"10.1007\/978-3-030-81242-3_17"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Sellitto, G., Masi, M., Pavleska, T., and Aranha, H. (2021). A cyber security digital twin for critical infrastructure protection: The Intelligent Transport System use case. IFIP Working Conference on The Practice of Enterprise Modeling; Lecture notes in Business Information Processing, Springer International Publishing.","DOI":"10.1007\/978-3-030-91279-6_16"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Pirbhulal, S., Abie, H., and Shukla, A. (2022, January 19\u201322). Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications. Proceedings of the 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland.","DOI":"10.1109\/VTC2022-Spring54318.2022.9860581"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Mylrea, M., Fracchia, C., Grimes, H., Austad, W., Shannon, G., Reid, B., and Case, N. (2021). BioSecure Digital Twin: Manufacturing Innovation and cybersecurity resilience. Engineering Artificially Intelligent Systems, Springer International Publishing.","DOI":"10.1007\/978-3-030-89385-9_4"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Sellitto, G., Aranha, H., Masi, M., and Pavleska, T. (2021). Enabling a zero trust architecture in smart grids through a digital twin. Communications in Computer and Information Science, Springer International Publishing.","DOI":"10.1007\/978-3-030-86507-8_7"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Marksteiner, S., Bronfman, S., Wolf, M., and Lazebnik, E. (2021, January 6\u201310). Using Cyber Digital Twins for automated automotive cybersecurity testing. Proceedings of the 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, Austria.","DOI":"10.1109\/EuroSPW54576.2021.00020"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MIC.2021.3063674","article-title":"Towards cybersecurity of the smart grid using digital twins","volume":"26","year":"2022","journal-title":"IEEE Internet Comput."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"7273","DOI":"10.1007\/s10586-024-04320-x","article-title":"CyberDefender: An integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems","volume":"27","author":"Krishnaveni","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Kamdjou, H., and Ouchani, S. (2025). A Secure Architecture for Digital Twins in Resource-Constrained Industrial Systems. Comput. Sci. Eng., 1\u201312.","DOI":"10.1109\/MCSE.2025.3554031"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Dietz, M., Hageman, L., Von Hornung, C., and Pernul, G. (2022). Employing digital twins for Security-by-Design system testing. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Sat-CPS \u201922), Baltimore, MD, USA, 27 April 2022, Association for Computing Machinery.","DOI":"10.1145\/3510547.3517929"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MIC.2021.3059320","article-title":"Trustworthy digital twins in the industrial internet of things with blockchain","volume":"26","author":"Suhail","year":"2022","journal-title":"IEEE Internet Comput."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Somma, A., Casola, V., Cavalli, A., De Benedictis, A., Mallouli, W., and Vald\u00e9s, V. (2023, January 28\u201331). A Cyber Digital Twin framework to support Cyber-Physical systems security. Proceedings of the 2023 IEEE Smart World Congress (SWC), Portsmouth, UK.","DOI":"10.1109\/SWC57546.2023.10449161"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"102507","DOI":"10.1016\/j.cose.2021.102507","article-title":"Cyber-resilience of Critical Cyber Infrastructures: Integrating digital twins in the electric power ecosystem","volume":"112","author":"Salvi","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Czeczot, G., Rojek, I., Miko\u0142ajewski, D., and Sangho, B. (2023). AI in IIoT Management of Cybersecurity for Industry 4.0 and Industry 5.0 Purposes. Electronics, 12.","DOI":"10.3390\/electronics12183800"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Salam, A., Ullah, F., Amin, F., and Abrar, M. (2023). Deep Learning Techniques for Web-Based Attack Detection in Industry 5.0: A Novel approach. Technologies, 11.","DOI":"10.3390\/technologies11040107"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"1903","DOI":"10.1109\/TCE.2023.3318850","article-title":"An Ensemble-Based Machine Learning-Envisioned intrusion detection in industry 5.0-Driven healthcare applications","volume":"70","author":"Wazid","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1109\/TCE.2023.3320282","article-title":"Blockchain Assisted Hybrid Intrusion Detection System in Autonomous Vehicles for Industry 5.0","volume":"69","author":"Anbalagan","year":"2023","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"7156","DOI":"10.1109\/ACCESS.2024.3351485","article-title":"A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic review","volume":"12","author":"Shaikh","year":"2024","journal-title":"IEEE Access"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Balogh, M., F\u00f6ldv\u00e1ri, A., and Varga, P. (2023, January 8\u201312). Digital Twins in Industry 5.0: Challenges in Modeling and communication. Proceedings of the NOMS 2023\u20142023 IEEE\/IFIP Network Operations and Management Symposium, Miami, FL, USA.","DOI":"10.1109\/NOMS56928.2023.10154424"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"1708","DOI":"10.1177\/09544054221110960","article-title":"A digital twin-based human-robot collaborative system for the assembly of complex-shaped architectures","volume":"239","author":"Zhang","year":"2025","journal-title":"Proc. Inst. Mech. Eng. Part B J. Eng. Manuf."},{"key":"ref_95","first-page":"84","article-title":"Cybersecurity in electric and flying vehicles: Threats, challenges, AI solutions & future directions","volume":"57","author":"Alqahtani","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"103796","DOI":"10.1016\/j.jnca.2023.103796","article-title":"Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey","volume":"223","author":"Zeb","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"102321","DOI":"10.1016\/j.inffus.2024.102321","article-title":"The survey on multi-source Data Fusion in cyber-physical-social systems: Foundational infrastructure for industrial metaverses and industries 5.0","volume":"107","author":"Wang","year":"2024","journal-title":"Inf. Fusion"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Alves, J., Lima, T., and Gaspar, P. (2023). Is Industry 5.0 a Human-Centred Approach? A systematic review. Processes, 11.","DOI":"10.3390\/pr11010193"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Minc\u0103, E., Filipescu, A., Cernega, D., \u0218olea, R., Filipescu, A., Ionescu, D., and Simion, G. (2022). Digital Twin for a Multifunctional Technology of Flexible Assembly on a Mechatronics Line with Integrated Robotic Systems and Mobile Visual Sensor\u2014Challenges towards Industry 5.0. Sensors, 22.","DOI":"10.3390\/s22218153"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M., Amir, A., Vuda, K.V., and Sarwat, A.I. (2023). Impact, vulnerabilities, and mitigation strategies for Cyber-Secure critical infrastructure. Sensors, 23.","DOI":"10.3390\/s23084060"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Saeed, S., Altamimi, S., Alkayyal, N., Alshehri, E., and Alabbad, D. (2023). Digital Transformation and Cybersecurity Challenges for businesses Resilience: Issues and recommendations. Sensors, 23.","DOI":"10.3390\/s23156666"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.jmsy.2021.02.009","article-title":"Building a right digital twin with model engineering","volume":"59","author":"Zhang","year":"2021","journal-title":"J. Manuf. Syst."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Herb\u00f3n, R., Gonz\u00e1lez-Mateos, G., Rodr\u00edguez-Ossorio, J., Dom\u00ednguez, M., Alonso, S., and Fuertes, J. (2024). An approach to develop digital twins in industry. Sensors, 24.","DOI":"10.3390\/s24030998"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Yadav, N., Maurya, N., and Mehta, N. (2024). When Industry meets Trustworthy AI: A Systematic Review of AI for Industry 5.0. Int. J. Adv. Res. Sci. Commun. Technol., 616\u2013622.","DOI":"10.48175\/IJARSCT-17683"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.3390\/encyclopedia3030080","article-title":"The Metaverse in Industry 5.0: A Human-Centric Approach towards Personalized Value Creation","volume":"3","author":"Mourtzis","year":"2023","journal-title":"Encyclopedia"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1186\/s13677-022-00314-5","article-title":"Future of industry 5.0 in society: Human-centric solutions, challenges and prospective research areas","volume":"11","author":"Adel","year":"2022","journal-title":"J. Cloud Comput. Adv. Syst. Appl."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"12342","DOI":"10.1109\/ACCESS.2023.3236002","article-title":"MedAi: A smartwatch-based application framework for the prediction of common diseases using machine learning","volume":"11","author":"Himi","year":"2023","journal-title":"IEEE Access"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1080\/0951192X.2021.1925966","article-title":"Digital twin for human-machine interaction with convolutional neural network","volume":"34","author":"Wang","year":"2021","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Oliveira, M., Chauhan, S., Pereira, F., Felgueiras, C., and Carvalho, D. (2023). Blockchain Protocols and edge computing targeting Industry 5.0 needs. Sensors, 23.","DOI":"10.20944\/preprints202306.1159.v1"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Nobel, S.M.N., Sultana, S., Singha, S.P., Chaki, S., Mahi, M.J.N., Jan, T., Barros, A., and Whaiduzzaman, M. (2024). Unmasking banking fraud: Unleashing the power of machine learning and explainable AI (XAI) on imbalanced data. Information, 15.","DOI":"10.3390\/info15060298"},{"key":"ref_111","unstructured":"Khan, S., and Arsalan, H. (2026, February 01). Sustainable Progress through IoT Safety and Knowledge Management in Society 5.0. Available online: https:\/\/www.researchgate.net\/publication\/380151598_Sustainable_Progress_through_IoT_Safety_and_Knowledge_Management_in_Society_50."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"01097","DOI":"10.1051\/bioconf\/20248601097","article-title":"Security and Privacy in AI-Driven Industry 5.0: Experimental insights and threat analysis","volume":"86","author":"Dmitrieva","year":"2024","journal-title":"BIO Web Conf."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"01070","DOI":"10.1051\/bioconf\/20248601070","article-title":"Blockchain Integration in Industry 5.0: A security Experiment for resilience assessment","volume":"86","author":"Natalia","year":"2024","journal-title":"BIO Web Conf."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Leng, J., Chen, Z., Huang, Z., Zhu, X., Su, H., Lin, Z., and Zhang, D. (2022). Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions. Machines, 10.","DOI":"10.3390\/machines10100858"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"101887","DOI":"10.1016\/j.techsoc.2022.101887","article-title":"Can industry 5.0 revolutionize the wave of resilience and social value creation? A multi-criteria framework to analyze enablers","volume":"68","author":"Sindhwani","year":"2022","journal-title":"Technol. Soc."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Zhang, Y. (2024). Edge computing for digital Twin. Simula SpringerBriefs on Computing, Springer.","DOI":"10.1007\/978-3-031-51819-5"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/MNET.001.2200484","article-title":"A Digital Twin-Based Drone-Assisted Secure Data Aggregation Scheme with Federated Learning in Artificial Intelligence of Things","volume":"37","author":"Islam","year":"2023","journal-title":"IEEE Netw."},{"key":"ref_118","first-page":"902","article-title":"An adaptive combination algorithm based on deep learning and genetic algorithm for anomalous events detection","volume":"31","author":"Abbas","year":"2023","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Eze, P., Geard, N., Mueller, I., and Chades, I. (2023). Anomaly detection in endemic disease surveillance data using machine learning techniques. Healthcare, 11.","DOI":"10.20944\/preprints202305.0722.v1"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Rashid, A., Ahmed, M., and Ullah, A. (2022). Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security, CRC Press. CRC Press eBooks.","DOI":"10.1201\/9781003121541-6"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Zhang, G., MacCarthy, B., and Ivanov, D. (2022). The Cloud, Platforms, and Digital Twins\u2014Enablers of the Digital Supply Chain, Elsevier. Elsevier eBooks.","DOI":"10.1016\/B978-0-323-91614-1.00005-8"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1109\/ACCESS.2017.2657006","article-title":"C2PS: A digital twin architecture erence model for the Cloud-Based Cyber-Physical systems","volume":"5","author":"Alam","year":"2017","journal-title":"IEEE Access"},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"124443","DOI":"10.1016\/j.jclepro.2020.124443","article-title":"Efficient container virtualization-based digital twin simulation of smart industrial systems","volume":"281","author":"Lin","year":"2021","journal-title":"J. Clean. Prod."},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Cao, Y., Currie, C., Onggo, B., and Higgins, M. (2021, January 12\u201315). Simulation optimization for a digital twin using a Multi-Fidelity Framework. Proceedings of the 2021 Winter Simulation Conference (WSC), Phoenix, AZ, USA.","DOI":"10.1109\/WSC52266.2021.9715498"},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"012053","DOI":"10.1088\/1742-6596\/2504\/1\/012053","article-title":"Research and design of real time big data Visualization analysis platform based on Flink","volume":"2504","author":"Zhang","year":"2023","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Papachristopoulou, K., Agorogiannis, E., Ipektsidis, C., Gkioni, A., Parasyris, A., Metheniti, V., and Ristolainen, A. (2025, January 4\u20136). StreamHandler as a Real-Time Decision Support System for Environmental Monitoring in Digital Twins of the Ocean. Proceedings of the 2025 6th International Conference in Electronic Engineering & Information Technology (EEITE), Chania, Greece.","DOI":"10.1109\/EEITE65381.2025.11165883"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Fotre, S., McCann, J., Wallace, J., Motawa, I., McKane, M., McChesney, I., Bond, R., and Carracedo, J.M. (2023, January 28\u201331). A Digital-Twin pipeline for the optimisation of marine outfitting. Proceedings of the 2023 IEEE Smart World Congress (SWC), Portsmouth, UK.","DOI":"10.1109\/SWC57546.2023.10448615"},{"key":"ref_128","unstructured":"(2022). Information Security, Cybersecurity and Privacy Protection\u2014Information Security Management Systems\u2014Requirements (Standard No. ISO\/IEC 27001:2022)."},{"key":"ref_129","unstructured":"Industry IoT Consortium (2023). Industrial Internet Security Framework\u2014Industry IoT Consortium, Industry IoT Consortium."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"101864","DOI":"10.1016\/j.cose.2020.101864","article-title":"Model-based risk assessment for cyber physical systems security","volume":"96","author":"Tantawy","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Ibrokhimov, S., Hui, K., Al-Absi, A., Lee, H., and Sain, M. (2019, January 17\u201320). Multi-Factor Authentication in Cyber Physical System: A state of art survey. Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Republic of Korea.","DOI":"10.23919\/ICACT.2019.8701960"},{"key":"ref_132","unstructured":"ISA\/IEC (2018). ISA\/IEC 62443 Series of Standards: Security for Industrial Automation and Control Systems, International Society of Automation."},{"key":"ref_133","unstructured":"(2024). The NIST Cybersecurity Framework (CSF) 2.0."},{"key":"ref_134","unstructured":"Evani, P.K. (2020, January 01). Agentic Ai Security: A Control Framework for Autonomous Decision-Making Systems. Available online: https:\/\/ssrn.com\/abstract=5332681."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"234","DOI":"10.26599\/BDMA.2022.9020047","article-title":"Security and Privacy in Metaverse: A Comprehensive survey","volume":"6","author":"Huang","year":"2023","journal-title":"Big Data Min. Anal."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"252","DOI":"10.4236\/jcc.2024.123016","article-title":"From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A quantum leap to Q-Day security","volume":"12","author":"Raheman","year":"2024","journal-title":"J. Comput. Commun."},{"key":"ref_137","unstructured":"Angrisani, A., Doosti, M., and Kashefi, E. (2023). A unifying framework for differentially private quantum algorithms. arXiv."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/17\/2\/209\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:32:40Z","timestamp":1772083960000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/17\/2\/209"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,17]]},"references-count":137,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["info17020209"],"URL":"https:\/\/doi.org\/10.3390\/info17020209","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,17]]}}}