2018
DOI: 10.1007/978-3-319-99073-6_26
|View full text |Cite
|
Sign up to set email alerts
|

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 46 publications
(29 citation statements)
references
References 11 publications
0
26
0
Order By: Relevance
“…The usage of digital twins for penetrations testing is discussed in a recent work by Bitton et al [9]. The author investigate the relation behind a penetration test specification and system realization with focus on system cost optimization.…”
Section: B Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The usage of digital twins for penetrations testing is discussed in a recent work by Bitton et al [9]. The author investigate the relation behind a penetration test specification and system realization with focus on system cost optimization.…”
Section: B Related Workmentioning
confidence: 99%
“…Adversary models for digital twin systems have not been extensively treated in the literature as the concept mostly so far has been used for production optimization and not security. Certain security aspects regarding using digital twin as security enablers in IACS are considered in [10] and [9]. The authors in [10] consider state replication for active monitoring and intrusion detection while [9] consider the problem of penentration testing of IACS with focus on cost optimization for specific security penetration tests (performed on simulated or emulated digital twin or on an acutal physical component in the IACS).…”
Section: A Adversary Modelmentioning
confidence: 99%
See 3 more Smart Citations