kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Comprehensive State-of-the-Art Review for Digital Twin: Cybersecurity Perspectives and Open Challenges
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0001-5206-9155
Institute of Informatics and Telecommunications, National Centre for Scientific Research “Demokritos”, Athens, Greece.
Institute of Informatics and Telecommunications, National Centre for Scientific Research “Demokritos”, Athens, Greece.
2025 (English)In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing: The 19th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2024), Springer Nature , 2025, p. 78-98Conference paper, Published paper (Other academic)
Abstract [en]

The growing complexity and interconnectivity of modern systems have made the proactive identification and mitigation of vulnerabilities increasingly challenging. DTs, which offer dynamic and real-time virtual representations of physical systems, have emerged as a potential solution to enhance cybersecurity. However, several significant challenges exist, including the integration of DTs with existing cybersecurity frameworks and the effective use of DTs to detect and mitigate zero-day vulnerabilities. In this study, we conduct a systematic literature review to explore these challenges by addressing four key research questions. Our findings reveal critical challenges and open research problems associated with the implementation of DTs for cybersecurity. These insights are essential for advancing the security of complex systems, paving the way toward building resilient and secure cyber-infrastructures, enabling real-time assessment, effective remediation actions and cyber perception on emerging threats.

Place, publisher, year, edition, pages
Springer Nature , 2025. p. 78-98
Series
Lecture Notes on Data Engineering and Communications Technologies, ISSN 2367-4512, E-ISSN 2367-4520 ; 232
Keywords [en]
Attack Surface, Cybersecurity, Digital Twin, Game theory, Threat modeling
National Category
Computer Sciences Computer Systems Production Engineering, Human Work Science and Ergonomics
Identifiers
URN: urn:nbn:se:kth:diva-357894DOI: 10.1007/978-3-031-76462-2_8Scopus ID: 2-s2.0-85211166984OAI: oai:DiVA.org:kth-357894DiVA, id: diva2:1922601
Conference
19th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2024), San Benedetto del Tronto, Italy, November 13-15, 2024
Note

Part of ISBN 978-3-031-76461-5, 978-3-031-76462-2

QC 20241219

Available from: 2024-12-19 Created: 2024-12-19 Last updated: 2024-12-19Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Jaber, Aws

Search in DiVA

By author/editor
Jaber, Aws
By organisation
Network and Systems Engineering
Computer SciencesComputer SystemsProduction Engineering, Human Work Science and Ergonomics

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 110 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf