2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2022
DOI: 10.1109/compsac54236.2022.00129
|View full text |Cite
|
Sign up to set email alerts
|

Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 20 publications
1
3
0
Order By: Relevance
“…The formal model makes implementing software based on digital twins more feasible. We have found that replication-based digital twins fit real-time data processing, and the literature confirms that simulation works decoupled from the live system, e.g., Dietz et al [43]. Using an event-based microservice architecture ensures flexibility and real-time data processing.…”
Section: Resultssupporting
confidence: 71%
“…The formal model makes implementing software based on digital twins more feasible. We have found that replication-based digital twins fit real-time data processing, and the literature confirms that simulation works decoupled from the live system, e.g., Dietz et al [43]. Using an event-based microservice architecture ensures flexibility and real-time data processing.…”
Section: Resultssupporting
confidence: 71%
“…Though the integration of operational technology and IT systems in Industry 4.0 increases the risk of cyber attacks [13] and technologies like Digital Twin offer possibilities to improve security [14]. In fact, the literature review also suggests that Digital Twin can be applied to enhance security in Industry 4.0 applications across multiple sectors.…”
Section: Rq1: Digital Twin As Security Tool In Industry 40mentioning
confidence: 99%
“…A framework that utilizes Digital Twin as a simulation tool to generate Cyber Threat Intelligence (CTI) which can provide valuable threat information for organizations to improve their security postures, is presented in this study [14].…”
Section: Ics/cps Environment Use Casementioning
confidence: 99%
See 1 more Smart Citation