| Veröffentlichte Version Download ( PDF | 1MB) | Lizenz: Creative Commons Namensnennung 4.0 International |
Digital Twins in Security Operations: State of the Art and Future Perspectives
Empl, Philip Maurice
, Koch, David, Dietz, Marietheres
und Pernul, Günther
(2025)
Digital Twins in Security Operations: State of the Art and Future Perspectives.
ACM Computing Surveys 58 (1), S. 1-38.
Veröffentlichungsdatum dieses Volltextes: 30 Sep 2025 10:15
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.77887
Zusammenfassung
In an era of rapid technological advancements, digital twins are gaining attention in industry and research. These virtual representations of real-world entities, enabled by the Internet of Things (IoT), offer advanced simulation and analysis capabilities. Their application spans various sectors, from smart manufacturing to healthcare, highlighting their versatility. However, the rise of digital ...
In an era of rapid technological advancements, digital twins are gaining attention in industry and research. These virtual representations of real-world entities, enabled by the Internet of Things (IoT), offer advanced simulation and analysis capabilities. Their application spans various sectors, from smart manufacturing to healthcare, highlighting their versatility. However, the rise of digital technologies has also escalated cybersecurity concerns. Historical cyberattacks underscore the urgency for enhanced security operations. In this context, digital twins represent a novel approach to cybersecurity. Industry and academic research are increasingly exploring their potential to protect their assets. Despite growing interest and applications, more comprehensive research synthesis needs to be done, particularly in security operations based on digital twins. Our article aims to fill this gap through a structured literature review aggregating knowledge from 201 publications. We focus on defining the digital twin in cybersecurity, exploring its applications, and outlining implementations and challenges. To maintain transparency, our data is documented and is publicly available. This survey serves as a crucial guide for academic and industry stakeholders, fostering digital twins in security operations.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Artikel | ||||
| Titel eines Journals oder einer Zeitschrift | ACM Computing Surveys | ||||
| Band: | 58 | ||||
|---|---|---|---|---|---|
| Nummer des Zeitschriftenheftes oder des Kapitels: | 1 | ||||
| Seitenbereich: | S. 1-38 | ||||
| Datum | 1 Juli 2025 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | Digital twin security operations cybersecurity survey literature review | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Zum Teil | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-778872 | ||||
| Dokumenten-ID | 77887 |
Downloadstatistik
Downloadstatistik