<div dir="ltr"><div class="gmail_quote"><div dir="ltr"><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px;color:rgb(51,51,51);font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;font-size:18px;background-color:rgb(252,252,252)"><span style="margin:0px;box-sizing:inherit">IJIS(I.F.) Special Issue: <a href="https://link.springer.com/collections/jeddaggegb" target="_blank">Reinforcing Cyber Security of Critical Infrastructures through Digital Twins</a></span></p><span style="margin:0px;box-sizing:inherit;color:rgb(51,51,51);font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;font-size:18px;background-color:rgb(252,252,252)"></span><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px;display:inline;color:rgb(51,51,51);font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;font-size:18px;background-color:rgb(252,252,252)"></p><div><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px;display:inline;color:rgb(51,51,51);font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;font-size:18px;background-color:rgb(252,252,252)">Springer: <a href="https://www.springer.com/journal/10207" target="_blank">International Journal of Information Security (I.F. 3.2)</a><br></p></div><div><br></div><font face="arial, sans-serif">Digital Twins are seen as one of the emerging technologies. In recent years, the conceptualization, development, and implementation of digital twins in different domains is clearly evident. There will be more and more connected devices in use around the world with the evolution of technologies like the Internet of Things. Furthermore, with the emergence of remote access, operators and critical systems are increasingly connected using remote connectivity. At the same time, there is an increased rate of cyber-attacks. These are reasons why cyber security is critically important to contemporary society as these factors make critical infrastructures even more susceptible to cyber-attacks. However, in order to make critical infrastructures cyber-resilient, performing cyber security testing/exercises on real-world systems is impractical. Digital twins in different domains provide the capability to be used for a wide range of cybersecurity tests. On the other hand, digital twins are susceptible to different types of cyber threats that could lead to negative consequences.</font><p></p><div style="margin:0px 0px 16px;box-sizing:inherit;padding:1.5em 0px 0px;color:rgb(51,51,51);background-color:rgb(252,252,252)"><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">This special issue aims to gather high-quality empirical, experimental, and theoretical research reporting original and unpublished results. Topics of interest for this special issue include, but are not limited to:</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">•Methods and techniques in the development of digital twins for cyber security</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Artificial intelligence and machine learning approaches for digital twins</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Enabling technologies for digital twins</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Digital twins for security testing</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Use of digital twins in the security operations center</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Cyber situational awareness through digital twins</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Digital twins for attack prediction</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Digital twins in cyber risk management</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Digital twin-based anomaly detection</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Digital twins for decision making in cyber security</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Incident response using digital twins</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Cyber security training/education via digital twins</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Secure data management in digital twins</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Human digital twin for cyber security</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Cyber security threats in adopting digital twins</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">• Security issues in Condition Monitoring, diagnostics, and prognosis in digital twins</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">•Novel solutions for securing critical components with digital twins.</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">Submitted papers should present original, unpublished work, relevant to one of the topics of the Special Issue. All submitted papers will be evaluated on the basis of relevance, significance of contribution, technical quality, scholarship, and quality of presentation, by at least two independent reviewers. It is the policy of the journal that no submission, or substantially overlapping submission, be published or be under review at another journal or conference at any time during the review process.</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">Schedule</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">Submission Deadline: 29th February 2024</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">First Round of Review Notification: 31st May 2024</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">Revised Paper Submission: 15th July 2024</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px 0px 1.5em;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">Final Decision Notification: 30th September 2024</font></p><font face="arial, sans-serif"><span style="margin:0px;box-sizing:inherit;box-sizing:inherit"></span></font><p style="margin:0px;box-sizing:inherit;padding:0px"><font face="arial, sans-serif">Planned Publication: Nov-Dec 2024</font></p><p style="margin:0px;box-sizing:inherit;padding:0px"><br></p><p style="font-size:18px;font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;margin:0px;box-sizing:inherit;padding:0px">Editors</p><p style="font-size:18px;font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;margin:0px;box-sizing:inherit;padding:0px"><br></p><ul style="font-size:18px;font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;margin:0px;box-sizing:inherit;list-style:none;padding:0px"><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><img src="https://link.springer.com/oscar-static/images/guest-editor-27d1ae806b.svg" alt="Sabarathinam Chockalingam" style="margin:0px 16px 8px 0px;box-sizing:inherit;border:0px;max-width:100%;height:64px;vertical-align:middle;width:64px;border-radius:50%"><a role="button" aria-expanded="false" style="background-color:transparent;margin:0px;box-sizing:inherit;color:rgb(0,75,131);text-decoration-line:underline;word-break:break-word;display:inline!important">Sabarathinam Chockalingam</a><span style="margin:0px;box-sizing:inherit;display:inline-block">, <span style="background-color:rgb(255,255,255);font-family:Georgia,Palatino,serif;font-size:16px">Institute for Energy Technology, Halden, Norway; <a href="mailto:sabarathinam.chockalingam@ife.no" target="_blank">sabarathinam.chockalingam@ife.no</a></span></span></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><img src="https://link.springer.com/oscar-static/images/guest-editor-27d1ae806b.svg" alt="Vasileios Gkioulos" style="margin:0px 16px 8px 0px;box-sizing:inherit;border:0px;max-width:100%;height:64px;vertical-align:middle;width:64px;border-radius:50%"><span style="margin:0px;box-sizing:inherit"><a role="button" aria-expanded="false" style="margin:0px;box-sizing:inherit;background-color:transparent;color:rgb(0,75,131);text-decoration-line:underline;word-break:break-word">Vasileios Gkioulos</a></span><span style="margin:0px;box-sizing:inherit;display:inline-block">, <span style="background-color:rgb(255,255,255);font-family:Georgia,Palatino,serif;font-size:16px">Norwegian University of Science and Technology; <a href="mailto:vasileios.gkioulos@ntnu.no" target="_blank">vasileios.gkioulos@ntnu.no</a></span></span></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><span style="margin:0px;box-sizing:inherit;display:inline-block"> </span></li> </ul><ul style="font-size:18px;font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;margin:0px;box-sizing:inherit;list-style:none;padding:0px"><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><img src="https://link.springer.com/oscar-static/images/guest-editor-27d1ae806b.svg" alt="Clara Maathuis" style="margin:0px 16px 8px 0px;box-sizing:inherit;border:0px;max-width:100%;height:64px;vertical-align:middle;width:64px;border-radius:50%"><span style="margin:0px;box-sizing:inherit"><a role="button" aria-expanded="false" style="margin:0px;box-sizing:inherit;background-color:transparent;color:rgb(0,75,131);text-decoration-line:underline;word-break:break-word">Clara Maathuis</a></span><span style="margin:0px;box-sizing:inherit;display:inline-block">, <span style="background-color:rgb(255,255,255);font-family:Georgia,Palatino,serif;font-size:16px">Open University of the Netherlands, Heerlen, The     Netherlands, <a href="mailto:clara.maathuis@ou.nl" target="_blank">clara.maathuis@ou.nl</a></span></span></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><span style="margin:0px;box-sizing:inherit;display:inline-block"><ul style="margin:0px;box-sizing:inherit;list-style:none;padding:0px"><li style="margin:0px;box-sizing:inherit;display:inline-block"><span style="margin:0px;box-sizing:inherit;display:inline-block"><br></span></li></ul><br></span></li> <li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><br></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><br></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><br></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><br></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><br></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex">  </div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><br></div></li><li style="margin:0px;box-sizing:inherit;display:inline-block"><div style="margin:0px;box-sizing:inherit;padding:0px;display:flex"><img src="https://link.springer.com/oscar-static/images/guest-editor-27d1ae806b.svg" alt="Sanjay Misra" style="margin:0px 16px 8px 0px;box-sizing:inherit;border:0px;max-width:100%;height:64px;vertical-align:middle;width:64px;border-radius:50%"><span style="margin:0px;box-sizing:inherit"><a role="button" aria-expanded="false" style="margin:0px;box-sizing:inherit;background-color:transparent;color:rgb(0,75,131);text-decoration-line:underline;word-break:break-word">Sanjay Misra</a></span><span style="margin:0px;box-sizing:inherit;display:inline-block"> <span style="background-color:rgb(255,255,255);font-family:Georgia,Palatino,serif;font-size:16px">Institute for Energy Technology, Halden, Norway; <a href="mailto:sanjay.misra@ife.no" target="_blank">sanjay.misra@ife.no<br></a></span></span></div></li></ul></div></div>
</div></div>