{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T06:04:30Z","timestamp":1773468270362,"version":"3.50.1"},"reference-count":88,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:00:00Z","timestamp":1773273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research Council of Norway through the SFI Norwegian Centre for Cybersecurity in Critical Sectors","award":["310105"],"award-info":[{"award-number":["310105"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Digital Twins (DTs) are increasingly recognized as a strategic technology for enhancing cybersecurity in industrial environments, particularly in the face of rising threats targeting Operational Technology (OT). After comparatively examining closely related DT\u2013cybersecurity frameworks to position the contribution within the existing research landscape, this paper presents a systematic literature review and comparative analysis of 19 recent DT-based cybersecurity studies, focusing on their relevance to incident detection and response in sectors such as Industrial Internet of Things (IIoT), manufacturing, and energy. The analysis evaluates each study across multiple dimensions, including attack types, detection and response mechanisms, DT integration, and technology stacks. From this review, we derive a consolidated set of requirements, categorized as functional, non-functional, security-specific, and domain-specific. These requirements serve as the foundation for a novel, cybersecurity-focused, ISO 23247-based framework. The proposed architecture formalizes a DT-enabled incident detection and response lifecycle aligned with ISO 23247. It is explicitly mapped to the derived requirements and detailed with practical implementation considerations. This work contributes a structured, evidence-based approach to DT-based security engineering and offers a reference design for researchers and practitioners aiming to build resilient, adaptive cybersecurity solutions in industrial settings.<\/jats:p>","DOI":"10.3390\/info17030286","type":"journal-article","created":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:46:31Z","timestamp":1773326791000},"page":"286","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity Digital Twins for Industrial Systems: From Literature Synthesis to Framework Design"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8883-0735","authenticated-orcid":false,"given":"Konstantinos E.","family":"Kampourakis","sequence":"first","affiliation":[{"name":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, 2802 Gj\u00f8vik, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7304-3835","authenticated-orcid":false,"given":"Vasileios","family":"Gkioulos","sequence":"additional","affiliation":[{"name":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, 2802 Gj\u00f8vik, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2966-9683","authenticated-orcid":false,"given":"Sokratis","family":"Katsikas","sequence":"additional","affiliation":[{"name":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, 2802 Gj\u00f8vik, Norway"}]}],"member":"1968","published-online":{"date-parts":[[2026,3,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"103383","DOI":"10.1016\/j.cose.2023.103383","article-title":"A systematic literature review on wireless security testbeds in the cyber-physical realm","volume":"133","author":"Kampourakis","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/00396338.2011.555586","article-title":"Stuxnet and the future of cyber war","volume":"53","author":"Farwell","year":"2011","journal-title":"Survival"},{"key":"ref_3","unstructured":"Reed, J. (2026, February 03). Cost of a Data Breach: The Industrial Sector. Available online: https:\/\/www.ibm.com\/think\/insights\/cost-of-a-data-breach-industrial-sector."},{"key":"ref_4","unstructured":"Guardian, T. (2026, February 03). More Than 25% of UK Businesses Hit by Cyber-Attack in Last Year, Report Finds. Available online: https:\/\/www.theguardian.com\/business\/2025\/jun\/30\/uk-businesses-hit-by-cyber-attack-last-year-report."},{"key":"ref_5","unstructured":"Nair, A. (2026, February 03). Cyberattack Downtime Costs by Industry: Key Stats. Available online: https:\/\/technologyradius.com\/statistic\/cyberattack-downtime-costs-by-industry."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Grabis, J., Vos, T.E.J., Escalona, M.J., and Pastor, O. (2025). Digital Twins for Incident Detection and Response. Proceedings of the Research Challenges in Information Science, Seville, Spain, 20\u201323 May 2025, Springer. Lecture Notes in Business Information Processing.","DOI":"10.1007\/978-3-031-92474-3"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Holmes, D., Papathanasaki, M., Maglaras, L., Ferrag, M.A., Nepal, S., and Janicke, H. (2021). Digital twins and cyber security\u2013solution or challenge?. Proceedings of the 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Preveza, Greece, 24\u201326 September 2021, IEEE.","DOI":"10.1109\/SEEDA-CECNSM53056.2021.9566277"},{"key":"ref_8","unstructured":"Faleiro, R., Pan, L., Pokhrel, S.R., and Doss, R. (2021). Digital twin for cybersecurity: Towards enhancing cyber resilience. Proceedings of the International Conference on Broadband Communications, Networks and Systems, Virtual Event, 28\u201329 October 2021, Springer."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"144150","DOI":"10.1109\/ACCESS.2024.3455410","article-title":"A systematic literature review on the methods and challenges in detecting zero-day attacks: Insights from the recent crowdstrike incident","volume":"12","author":"Por","year":"2024","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"103961","DOI":"10.1016\/j.compind.2023.103961","article-title":"ENIGMA: An explainable digital twin security solution for cyber\u2013physical systems","volume":"151","author":"Suhail","year":"2023","journal-title":"Comput. Ind."},{"key":"ref_11","first-page":"103917","article-title":"A step-by-step definition of a reference architecture for cyber ranges","volume":"88","author":"Kampourakis","year":"2025","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Nurcan, S., Opdahl, A.L., Mouratidis, H., and Tsohou, A. (2023). Secure Infrastructure for Cyber-Physical Ranges. Proceedings of the Research Challenges in Information Science: Information Science and the Connected World, Corfu, Greece, 23\u201326 May 2023, Springer.","DOI":"10.1007\/978-3-031-33080-3"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2248","DOI":"10.1109\/COMST.2021.3094360","article-title":"A Survey on Industrial Control System Testbeds and Datasets for Security Research","volume":"23","author":"Conti","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"16749","DOI":"10.1109\/JIOT.2021.3051158","article-title":"Digital twin for intelligent context-aware IoT healthcare systems","volume":"8","author":"Elayan","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2230","DOI":"10.1109\/COMST.2022.3198273","article-title":"Digital twin of wireless systems: Overview, taxonomy, challenges, and opportunities","volume":"24","author":"Khan","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"NIST (2025, March 03). Cybersecurity Framework, Available online: https:\/\/www.nist.gov\/cyberframework.","DOI":"10.6028\/NIST.SP.1308.ipd"},{"key":"ref_17","unstructured":"ISA (2025, March 03). ISA\/IEC 62443 Series of Standards. Available online: https:\/\/www.isa.org\/standards-and-publications\/isa-standards\/isa-iec-62443-series-of-standards."},{"key":"ref_18","unstructured":"(2021). Automation Systems and Integration\u2014Digital Twin Framework for Manufacturing (Standard No. ISO 23247). Available online: https:\/\/www.iso.org\/standard\/78743.html."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"171672","DOI":"10.1016\/j.scitotenv.2024.171672","article-title":"Digital technologies to unlock safe and sustainable opportunities for medical device and healthcare sectors with a focus on the combined use of digital twin and extended reality applications: A review","volume":"926","author":"Rowan","year":"2024","journal-title":"Sci. Total Environ."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","article-title":"A survey of emerging threats in cybersecurity","volume":"80","author":"Nepal","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"102769","DOI":"10.1016\/j.rcim.2024.102769","article-title":"Exploring the synergies between collaborative robotics, digital twins, augmentation, and industry 5.0 for smart manufacturing: A state-of-the-art review","volume":"89","author":"Zafar","year":"2024","journal-title":"Robot. Comput.-Integr. Manuf."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"10953","DOI":"10.1109\/JSEN.2019.2935035","article-title":"Utilizing blockchain to overcome cyber security concerns in the internet of things: A review","volume":"19","author":"Alotaibi","year":"2019","journal-title":"IEEE Sens. J."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10462-024-10805-3","article-title":"A review of digital twins and their application in cybersecurity based on artificial intelligence","volume":"57","author":"Homaei","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"110350","DOI":"10.1016\/j.comnet.2024.110350","article-title":"A comprehensive survey on digital twin for future networks and emerging Internet of Things industry","volume":"244","author":"Hakiri","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"103857","DOI":"10.1016\/j.jnca.2024.103857","article-title":"The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal","volume":"225","author":"Somma","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"103120","DOI":"10.1016\/j.sysarc.2024.103120","article-title":"A comprehensive survey of digital twins: Applications, technologies and security challenges","volume":"151","author":"Jeremiah","year":"2024","journal-title":"J. Syst. Archit."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"e2494","DOI":"10.1002\/smr.2494","article-title":"Enhancing and securing cyber-physical systems and Industry 4.0 through digital twins: A critical review","volume":"35","author":"Lampropoulos","year":"2023","journal-title":"J. Softw. Evol. Process"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"100213","DOI":"10.1016\/j.egyai.2022.100213","article-title":"Towards electric digital twin grid: Technology and framework review","volume":"11","author":"Sifat","year":"2023","journal-title":"Energy AI"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.csi.2017.06.001","article-title":"Systematic literature review of usability capability\/maturity models","volume":"55","author":"Lacerda","year":"2018","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_30","unstructured":"Creswell, J.W., and Poth, C.N. (2016). Qualitative Inquiry and Research Design: Choosing Among Five Approaches, Sage Publications."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/ACCESS.2019.2950507","article-title":"A feature-based framework for structuring industrial digital twins","volume":"8","author":"Autiosalo","year":"2019","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"112407","DOI":"10.1016\/j.rser.2022.112407","article-title":"Energy digital twin technology for industrial energy management: Classification, challenges and future","volume":"161","author":"Yu","year":"2022","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1007\/s12652-018-0911-3","article-title":"An application framework of digital twin and its case study","volume":"10","author":"Zheng","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"101547","DOI":"10.1016\/j.iot.2025.101547","article-title":"A framework for enhancing cyber incident response with Security-Enhancing Digital Twins in Cyber-Physical Systems","volume":"31","author":"Suhail","year":"2025","journal-title":"Internet Things"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Sunkara, K.C., Dhasmana, G., K S, R., Yadav, M.N., Desai, I., and Shankar, R. (2024). Cyber Twin Technology for AI-Driven Real-Time Software Security in IoT Ecosystems. Proceedings of the 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC), Tumkuru, India, 4\u20135 December 2024, IEEE.","DOI":"10.1109\/ICMNWC63764.2024.10872137"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1109\/TASE.2023.3243147","article-title":"Digital twin-based cyber-attack detection framework for cyber-physical manufacturing systems","volume":"21","author":"Balta","year":"2023","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_37","unstructured":"Allison, D., Smith, P., and Mclaughlin, K. (September, January 29). Digital twin-enhanced incident response for cyber-physical systems. Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Empl, P., Schlette, D., Zupfer, D., and Pernul, G. (2022, January 23\u201326). SOAR4IoT: Securing IoT assets with digital twins. Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna, Austria.","DOI":"10.1145\/3538969.3538975"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Varghese, S.A., Ghadim, A.D., Balador, A., Alimadadi, Z., and Papadimitratos, P. (2022). Digital twin-based intrusion detection for industrial control systems. Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21\u201325 March 2022, IEEE.","DOI":"10.1109\/PerComWorkshops53856.2022.9767492"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"6611","DOI":"10.1109\/JIOT.2021.3113577","article-title":"MUD-based behavioral profiling security framework for software-defined IoT networks","volume":"9","author":"Krishnan","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Dietz, M., Vielberth, M., and Pernul, G. (2020, January 25\u201328). Integrating digital twin security simulations in the security operations center. Proceedings of the 15th International Conference on Availability, Reliability and Security, Virtual Event.","DOI":"10.1145\/3407023.3407039"},{"key":"ref_42","first-page":"103650","article-title":"A hybrid evolutionary and machine learning approach for smart city planning: Digital twin approach","volume":"64","author":"Ji","year":"2024","journal-title":"Sustain. Energy Technol. Assess."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"111039","DOI":"10.1016\/j.epsr.2024.111039","article-title":"Metaverse framework for power systems: Proposal and case study","volume":"237","author":"Menezes","year":"2024","journal-title":"Electr. Power Syst. Res."},{"key":"ref_44","unstructured":"(2020). Communication Networks and Systems for Power Utility Automation (Standard No. IEC 61850)."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Wang, R., Venugopalan, S., and Adepu, S. (2024). Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin. Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK, 2\u20134 September 2024, IEEE.","DOI":"10.1109\/CSR61664.2024.10679484"},{"key":"ref_46","unstructured":"MQTT (2025, March 25). MQTT Software. Available online: https:\/\/mqtt.org\/software\/."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"108061","DOI":"10.1016\/j.compeleceng.2022.108061","article-title":"An electric power digital twin for cyber security testing, research and education","volume":"101","author":"Kandasamy","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Sen, \u00d6., Schmidtke, F., Carere, F., Santori, F., Ulbig, A., and Monti, A. (2022). Investigating the cybersecurity of smart grids based on cyber-physical twin approach. Proceedings of the 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Singapore, 25\u201328 October 2022, IEEE.","DOI":"10.1109\/SmartGridComm52983.2022.9961061"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Yigit, Y., Panitsas, I., Maglaras, L., Tassiulas, L., and Canberk, B. (2024). Cyber-twin: Digital twin-boosted autonomous attack detection for vehicular ad-hoc networks. Proceedings of the ICC 2024-IEEE International Conference on Communications, Denver, CO, USA, 9\u201313 June 2024, IEEE.","DOI":"10.1109\/ICC51166.2024.10622784"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"102744","DOI":"10.1016\/j.simpat.2023.102744","article-title":"Digital twins in cyber effects modelling of IoT\/CPS points of low resilience","volume":"125","author":"Epiphaniou","year":"2023","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Yigit, Y., Kinaci, O.K., Duong, T.Q., and Canberk, B. (2023). TwinPot: Digital twin-assisted honeypot for cyber-secure smart seaports. Proceedings of the 2023 IEEE International Conference on Communications Workshops (ICC Workshops), Rome, Italy, 28 May\u20131 June 2023, IEEE.","DOI":"10.1109\/ICCWorkshops57953.2023.10283756"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1080\/0951192X.2022.2027014","article-title":"Digital twin in manufacturing: Conceptual framework and case studies","volume":"35","author":"Onaji","year":"2022","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Stojkovic, M., and Butt, J. (2022). Industry 4.0 implementation framework for the composite manufacturing industry. J. Compos. Sci., 6.","DOI":"10.3390\/jcs6090258"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"107261","DOI":"10.1016\/j.anucene.2019.107261","article-title":"Secure embedded intelligence in nuclear systems: Framework and methods","volume":"140","author":"Garcia","year":"2020","journal-title":"Ann. Nucl. Energy"},{"key":"ref_55","first-page":"207","article-title":"Zero trust architecture","volume":"800","author":"Stafford","year":"2020","journal-title":"NIST Spec. Publ."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/s10207-025-01113-0","article-title":"Digital Twin-Enabled Incident Detection and Response: A Systematic Review of Critical Infrastructures Applications","volume":"24","author":"Kampourakis","year":"2025","journal-title":"Int. J. Inf. Secur."},{"key":"ref_57","unstructured":"(2018). Systems and Software Engineering\u2014Life Cycle Processes\u2014Requirements Engineering (Standard No. ISO\/IEC\/IEEE 29148). Available online: https:\/\/www.iso.org\/standard\/72089.html."},{"key":"ref_58","unstructured":"(2021). Automation Systems and Integration\u2014Digital Twin Framework for Manufacturing Part 2: Reference Architecture (Standard No. ISO 23247-2)."},{"key":"ref_59","unstructured":"(2013). Industrial Communication Networks\u2014Network and System Security\u2014Part 3-3: System Security Requirements and Security Levels (Standard No. IEC 62443-3-3)."},{"key":"ref_60","unstructured":"(2023). Guide to Operational Technology (OT) Security (Standard No. NIST SP 800-82 Rev. 3)."},{"key":"ref_61","unstructured":"(2025). Incident Response Recommendations and Considerations for Cybersecurity Risk Management (Standard No. NIST SP 800-61 Rev. 3)."},{"key":"ref_62","unstructured":"(2012). Guide for Conducting Risk Assessments (Standard No. NIST SP 800-30 Rev. 1)."},{"key":"ref_63","unstructured":"(2020). Zero Trust Architecture (Standard No. NIST SP 800-207)."},{"key":"ref_64","unstructured":"(2022). Power Systems Management and Associated Information Exchange\u2014Data and Communications Security\u2014Part 14: Cyber Security Event Logging (Standard No. IEC 62351-14)."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1109\/COMST.2022.3171465","article-title":"Digital twin: A comprehensive survey of security threats","volume":"24","author":"Alcaraz","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_66","unstructured":"(2022). Information Security, Cybersecurity and Privacy Protection\u2014Information Security Risk Management (Standard No. ISO\/IEC 27005:2022)."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"113524","DOI":"10.1016\/j.dss.2021.113524","article-title":"Digital Twin: Generalization, characterization and implementation","volume":"145","author":"VanDerHorn","year":"2021","journal-title":"Decis. Support Syst."},{"key":"ref_68","first-page":"V002T07A001","article-title":"An analysis of the new ISO 23247 series of standards on digital twin framework for manufacturing","volume":"Volume 87240","author":"Shao","year":"2023","journal-title":"Proceedings of the International Manufacturing Science and Engineering Conference, New Brunswick, NJ, USA, 12\u201316 June 2023"},{"key":"ref_69","unstructured":"Elastic (2025, May 30). Lightweight Shipper for Logs. Available online: https:\/\/www.elastic.co\/beats\/filebeat."},{"key":"ref_70","unstructured":"Elastic (2025, May 30). Centralize, Transform & Stash Your Data. Available online: https:\/\/www.elastic.co\/logstash."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Kang, M.S., Lee, D.H., Bajestani, M.S., Kim, D.B., and Noh, S.D. (2024). Edge Computing-Based Digital Twin Framework Based on ISO 23247 for Enhancing Data Processing Capabilities. Machines, 13.","DOI":"10.3390\/machines13010019"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"4548","DOI":"10.1109\/JIOT.2020.3029131","article-title":"Digital-twin-enabled intelligent distributed clock synchronization in industrial IoT systems","volume":"8","author":"Jia","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_73","unstructured":"Hietala, J. (2020). Real-Time Two-Way Data Transfer with a Digital Twin via Web Interface. [Master\u2019s Thesis, Aalto University]."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"104397","DOI":"10.1016\/j.autcon.2022.104397","article-title":"Digital twin-enabled real-time synchronization for planning, scheduling, and execution in precast on-site assembly","volume":"141","author":"Jiang","year":"2022","journal-title":"Autom. Constr."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.jmsy.2022.04.004","article-title":"Hybrid physics-based and data-driven models for smart manufacturing: Modelling, simulation, and explainability","volume":"63","author":"Wang","year":"2022","journal-title":"J. Manuf. Syst."},{"key":"ref_76","unstructured":"Kamoi, R., and Kobayashi, K. (2020). Why is the mahalanobis distance effective for anomaly detection?. arXiv."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10207-024-00958-1","article-title":"Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS","volume":"24","author":"Kampourakis","year":"2025","journal-title":"Int. J. Inf. Secur."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.ins.2021.12.061","article-title":"Denoising temporal convolutional recurrent autoencoders for time series classification","volume":"588","author":"Zheng","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"117572","DOI":"10.1016\/j.oceaneng.2024.117572","article-title":"Long time series of ocean wave prediction based on PatchTST model","volume":"301","author":"Huang","year":"2024","journal-title":"Ocean Eng."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Peng, X., Lin, Y., Cao, Q., Cen, Y., Zhuang, H., and Lin, Z. (2022). Traffic anomaly detection in intelligent transport applications with time series data using informer. Proceedings of the 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC), Macau, China, 8\u201312 October 2022, IEEE.","DOI":"10.1109\/ITSC55140.2022.9922142"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Shumway, R.H., Stoffer, D.S., Shumway, R.H., and Stoffer, D.S. (2017). ARIMA models. Time Series Analysis and Its Applications: With R Examples, Springer.","DOI":"10.1007\/978-3-319-52452-8"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Sundermeyer, M., Schl\u00fcter, R., and Ney, H. (2012, January 9\u201313). Lstm neural networks for language modeling. Proceedings of the INTERSPEECH 2012, ISCA\u2019s 13th Annual Conference, Portland, OR, USA.","DOI":"10.21437\/Interspeech.2012-65"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s10844-022-00753-1","article-title":"Machine learning in industrial control system (ICS) security: Current landscape, opportunities and challenges","volume":"60","author":"Koay","year":"2023","journal-title":"J. Intell. Inf. Syst."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"2339","DOI":"10.1007\/s10586-022-03735-8","article-title":"Mitigating cyber threats through integration of feature selection and stacking ensemble learning: The LGBM and random forest intrusion detection perspective","volume":"26","author":"Mishra","year":"2023","journal-title":"Clust. Comput."},{"key":"ref_85","unstructured":"Elastic (2025, May 30). Discover, Iterate, and Resolve with ES|QL on Kibana. Available online: https:\/\/www.elastic.co\/kibana."},{"key":"ref_86","first-page":"100714","article-title":"Interoperability levels and challenges of digital twins in cyber-physical systems","volume":"42","author":"Acharya","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_87","unstructured":"Goh, J., Adepu, S., Junejo, K.N., and Mathur, A. (2016). A dataset to support research in the design of secure water treatment systems. Proceedings of the International Conference on Critical Information Infrastructures Security, Paris, France, 10\u201312 October 2016, Springer."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., Palleti, V.R., and Mathur, A.P. (2017, January 18\u201321). WADI: A water distribution testbed for research in the design of secure cyber physical systems. Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, Pittsburgh, PA, USA.","DOI":"10.1145\/3055366.3055375"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/17\/3\/286\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:15:53Z","timestamp":1773465353000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/17\/3\/286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,12]]},"references-count":88,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["info17030286"],"URL":"https:\/\/doi.org\/10.3390\/info17030286","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,12]]}}}