{"id":"https://openalex.org/W4415309423","doi":"https://doi.org/10.1007/978-3-032-07894-0_22","title":"Digital Twin for\u00a0Adaptive Adversary Emulation in\u00a0IIoT Control Networks","display_name":"Digital Twin for\u00a0Adaptive Adversary Emulation in\u00a0IIoT Control Networks","publication_year":2025,"publication_date":"2025-10-17","ids":{"openalex":"https://openalex.org/W4415309423","doi":"https://doi.org/10.1007/978-3-032-07894-0_22"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-032-07894-0_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-032-07894-0_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022282691","display_name":"Javier Coronel Parada","orcid":null},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]},{"id":"https://openalex.org/I4210087295","display_name":"Centre Tecnologic de Telecomunicacions de Catalunya","ror":"https://ror.org/001cwea56","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210087295","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Javier Parada","raw_affiliation_strings":["Computer Science Department, University of Malaga, Campus de Teatinos s/n, 29071, Malaga, Spain","Eurecat, Centre Tecnol\u00f2gic de Catalunya, IT & OT Security Unit, C/Bilbao 72, 08005, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Malaga, Campus de Teatinos s/n, 29071, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Eurecat, Centre Tecnol\u00f2gic de Catalunya, IT & OT Security Unit, C/Bilbao 72, 08005, Barcelona, Spain","institution_ids":["https://openalex.org/I4210087295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067782544","display_name":"Cristina Alcaraz","orcid":"https://orcid.org/0000-0003-0545-3191"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Cristina Alcaraz","raw_affiliation_strings":["Computer Science Department, University of Malaga, Campus de Teatinos s/n, 29071, Malaga, Spain"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Malaga, Campus de Teatinos s/n, 29071, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100641212","display_name":"Javier L\u00f3pez","orcid":"https://orcid.org/0000-0001-8066-9991"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Javier Lopez","raw_affiliation_strings":["Computer Science Department, University of Malaga, Campus de Teatinos s/n, 29071, Malaga, Spain"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Malaga, Campus de Teatinos s/n, 29071, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069183036","display_name":"Juan Caubet","orcid":"https://orcid.org/0000-0002-8650-4642"},"institutions":[{"id":"https://openalex.org/I4210087295","display_name":"Centre Tecnologic de Telecomunicacions de Catalunya","ror":"https://ror.org/001cwea56","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210087295","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan Caubet","raw_affiliation_strings":["Eurecat, Centre Tecnol\u00f2gic de Catalunya, IT & OT Security Unit, C/Bilbao 72, 08005, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"Eurecat, Centre Tecnol\u00f2gic de Catalunya, IT & OT Security Unit, C/Bilbao 72, 08005, Barcelona, Spain","institution_ids":["https://openalex.org/I4210087295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067577364","display_name":"Rodrigo Rom\u00e1n","orcid":"https://orcid.org/0000-0002-4099-1422"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Rodrigo Rom\u00e1n","raw_affiliation_strings":["Computer Science Department, University of Malaga, Campus de Teatinos s/n, 29071, Malaga, Spain"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Malaga, Campus de Teatinos s/n, 29071, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5022282691"],"corresponding_institution_ids":["https://openalex.org/I4210087295","https://openalex.org/I82767444"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.68711656,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"423","last_page":"442"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.7678999900817871},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.760699987411499},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.72079998254776},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5613999962806702},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5324000120162964},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4697999954223633},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4372999966144562},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4260999858379364},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41290000081062317},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.40369999408721924}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8353000283241272},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.7678999900817871},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.760699987411499},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.72079998254776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6657999753952026},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5613999962806702},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5324000120162964},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4697999954223633},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4372999966144562},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4260999858379364},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41290000081062317},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.40369999408721924},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.3885999917984009},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.3878999948501587},{"id":"https://openalex.org/C125611927","wikidata":"https://www.wikidata.org/wiki/Q17008131","display_name":"Criticality","level":2,"score":0.3653999865055084},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3594000041484833},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3386000096797943},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.31700000166893005},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.3156999945640564},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.298799991607666},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.29190000891685486},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C2777527080","wikidata":"https://www.wikidata.org/wiki/Q3557311","display_name":"Digital ecosystem","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25679999589920044},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2565000057220459},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-032-07894-0_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-032-07894-0_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2039168577","https://openalex.org/W2047940964","https://openalex.org/W2407377344","https://openalex.org/W2803857222","https://openalex.org/W2890904471","https://openalex.org/W2988359971","https://openalex.org/W3041605862","https://openalex.org/W3112209658","https://openalex.org/W3190778120","https://openalex.org/W4225657853","https://openalex.org/W4239508238","https://openalex.org/W4280533190","https://openalex.org/W4299984282","https://openalex.org/W4321843686","https://openalex.org/W4366320907","https://openalex.org/W4383425546","https://openalex.org/W4386214318","https://openalex.org/W4386451571","https://openalex.org/W4391425705","https://openalex.org/W4392693545","https://openalex.org/W4392982085"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-18T00:00:00"}
