{"id":"https://openalex.org/W7128733231","doi":"https://doi.org/10.1007/s44163-026-00916-x","title":"The role and applications of airport digital twin in cyberattack protection during the generative AI era","display_name":"The role and applications of airport digital twin in cyberattack protection during the generative AI era","publication_year":2026,"publication_date":"2026-02-12","ids":{"openalex":"https://openalex.org/W7128733231","doi":"https://doi.org/10.1007/s44163-026-00916-x"},"language":"en","primary_location":{"id":"doi:10.1007/s44163-026-00916-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-026-00916-x","pdf_url":null,"source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44163-026-00916-x","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037956466","display_name":"Abraham Itzhak Weinberg","orcid":"https://orcid.org/0000-0002-2505-9653"},"institutions":[{"id":"https://openalex.org/I198488067","display_name":"Tinbergen Institute","ror":"https://ror.org/054xxtt73","country_code":"NL","type":"education","lineage":["https://openalex.org/I198488067"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Abraham Itzhak Weinberg","raw_affiliation_strings":["AI-WEINBERG, AI Experts, Tel Aviv, Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"AI-WEINBERG, AI Experts, Tel Aviv, Israel","institution_ids":["https://openalex.org/I198488067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5037956466"],"corresponding_institution_ids":["https://openalex.org/I198488067"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":53.7699,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.99329322,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.1289999932050705,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.1289999932050705,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.11469999700784683,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.08959999680519104,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6316999793052673},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5432999730110168},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4884999990463257},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.37369999289512634},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.2888000011444092}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6316999793052673},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5788000226020813},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5651999711990356},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5432999730110168},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4884999990463257},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4075999855995178},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.37369999289512634},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3149999976158142},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.2849000096321106},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.27489998936653137},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44163-026-00916-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-026-00916-x","pdf_url":null,"source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5cb1f0feaa0d4c32b02fdc60638568f1","is_oa":true,"landing_page_url":"https://doaj.org/article/5cb1f0feaa0d4c32b02fdc60638568f1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Artificial Intelligence, Vol 6, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44163-026-00916-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-026-00916-x","pdf_url":null,"source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":95,"referenced_works":["https://openalex.org/W2002661876","https://openalex.org/W2077937403","https://openalex.org/W2518003110","https://openalex.org/W2808219177","https://openalex.org/W2906631955","https://openalex.org/W2949799731","https://openalex.org/W2952359131","https://openalex.org/W2972160586","https://openalex.org/W2982936646","https://openalex.org/W2996775081","https://openalex.org/W3004134674","https://openalex.org/W3013120860","https://openalex.org/W3036031637","https://openalex.org/W3039318158","https://openalex.org/W3047463735","https://openalex.org/W3091821587","https://openalex.org/W3108007647","https://openalex.org/W3109725889","https://openalex.org/W3110913086","https://openalex.org/W3121529912","https://openalex.org/W3129472311","https://openalex.org/W3129920713","https://openalex.org/W3132404826","https://openalex.org/W3164800436","https://openalex.org/W3165946426","https://openalex.org/W3203561189","https://openalex.org/W3211794639","https://openalex.org/W3214939895","https://openalex.org/W4200599108","https://openalex.org/W4205358918","https://openalex.org/W4205849845","https://openalex.org/W4210263542","https://openalex.org/W4214493728","https://openalex.org/W4220878208","https://openalex.org/W4225537087","https://openalex.org/W4225657853","https://openalex.org/W4226070056","https://openalex.org/W4248605347","https://openalex.org/W4285527974","https://openalex.org/W4287835673","https://openalex.org/W4288443103","https://openalex.org/W4290973502","https://openalex.org/W4292348542","https://openalex.org/W4295185247","https://openalex.org/W4298126988","https://openalex.org/W4306412489","https://openalex.org/W4310433243","https://openalex.org/W4312845868","https://openalex.org/W4312878571","https://openalex.org/W4312921962","https://openalex.org/W4313256807","https://openalex.org/W4319239193","https://openalex.org/W4320914352","https://openalex.org/W4362514681","https://openalex.org/W4366987041","https://openalex.org/W4376456833","https://openalex.org/W4379108680","https://openalex.org/W4379108993","https://openalex.org/W4379165435","https://openalex.org/W4380982224","https://openalex.org/W4382862492","https://openalex.org/W4385217783","https://openalex.org/W4385483372","https://openalex.org/W4386214347","https://openalex.org/W4386601492","https://openalex.org/W4386693657","https://openalex.org/W4386760777","https://openalex.org/W4387647860","https://openalex.org/W4388279677","https://openalex.org/W4388523068","https://openalex.org/W4389348452","https://openalex.org/W4389382844","https://openalex.org/W4389497068","https://openalex.org/W4389817600","https://openalex.org/W4390815680","https://openalex.org/W4390933204","https://openalex.org/W4391302608","https://openalex.org/W4391982535","https://openalex.org/W4392309208","https://openalex.org/W4393087172","https://openalex.org/W4393900622","https://openalex.org/W4394840095","https://openalex.org/W4395475942","https://openalex.org/W4396705350","https://openalex.org/W4396731540","https://openalex.org/W4398165763","https://openalex.org/W4399676798","https://openalex.org/W4400240320","https://openalex.org/W4400595771","https://openalex.org/W4401029837","https://openalex.org/W4401937829","https://openalex.org/W4402742274","https://openalex.org/W4403371192","https://openalex.org/W4406773938","https://openalex.org/W4411889930"],"related_works":[],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,55,121,139,163,177,181],"threat":[4,129],"facing":[5],"airports":[6],"from":[7,26],"growing":[8],"and":[9,49,71,87,113,128,135,144,155,169,186],"increasingly":[10],"sophisticated":[11],"cyberattacks":[12],"has":[13],"become":[14],"evident.":[15],"Airports":[16],"are":[17],"considered":[18],"a":[19,31,103],"strategic":[20],"national":[21],"asset,":[22],"so":[23],"protecting":[24],"them":[25],"attacks,":[27],"specifically":[28],"cyberattacks,":[29],"is":[30,40],"crucial":[32,104],"mission.":[33,57],"One":[34],"way":[35],"to":[36,69,81,161],"increase":[37],"airports\u2019":[38],"security":[39,56],"by":[41,109,152,166],"using":[42,85,131],"Digital":[43],"Twins":[44],"(DTs).":[45],"This":[46],"paper":[47,78,122,140,182],"shows":[48],"demonstrates":[50,123],"how":[51,97],"DTs":[52,61,98],"can":[53,67,99,149,189],"enhance":[54],"The":[58,77],"integration":[59],"of":[60,118],"with":[62,172],"Generative":[63],"AI":[64,174],"(GenAI)":[65],"algorithms":[66,171],"lead":[68],"synergy":[70],"new":[72],"frontiers":[73],"in":[74,116,192],"fighting":[75],"cyberattacks.":[76,119],"exemplifies":[79],"ways":[80,160],"model":[82],"cyberattack":[83],"scenarios":[84],"simulations":[86],"generate":[88],"synthetic":[89],"data":[90],"for":[91,106,125],"testing":[92],"defenses.":[93],"It":[94,157],"also":[95,158],"discusses":[96],"be":[100,150,190],"used":[101,151],"as":[102],"tool":[105],"vulnerability":[107],"assessment":[108],"identifying":[110],"weaknesses,":[111],"prioritizing,":[112],"accelerating":[114],"remediations":[115],"case":[117],"Moreover,":[120],"approaches":[124],"anomaly":[126],"detection":[127],"hunting":[130],"Machine":[132],"Learning":[133],"(ML)":[134],"GenAI":[136],"algorithms.":[137],"Additionally,":[138],"provides":[141],"impact":[142],"prediction":[143],"recovery":[145],"coordination":[146],"methods":[147],"that":[148,188],"DT":[153,178,193],"operators":[154],"stakeholders.":[156],"introduces":[159],"harness":[162],"human":[164],"factor":[165],"integrating":[167],"training":[168],"simulation":[170],"Explainable":[173],"(XAI)":[175],"into":[176],"platforms.":[179],"Lastly,":[180],"offers":[183],"future":[184],"applications":[185],"technologies":[187],"utilized":[191],"environments.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2026-02-13T00:00:00"}
