<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-13T07:33:02Z</responseDate><request verb="GetRecord" identifier="oai:www.recercat.cat:2117/428449" metadataPrefix="mets">https://recercat.cat/oai/request</request><GetRecord><record><header><identifier>oai:recercat.cat:2117/428449</identifier><datestamp>2026-01-30T08:05:52Z</datestamp><setSpec>com_2072_1033</setSpec><setSpec>col_2072_452950</setSpec></header><metadata><mets xmlns="http://www.loc.gov/METS/" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:doc="http://www.lyncode.com/xoai" ID="&#xa;&#x9;&#x9;&#x9;&#x9;DSpace_ITEM_2117-428449" TYPE="DSpace ITEM" PROFILE="DSpace METS SIP Profile 1.0" xsi:schemaLocation="http://www.loc.gov/METS/ http://www.loc.gov/standards/mets/mets.xsd" OBJID="&#xa;&#x9;&#x9;&#x9;&#x9;hdl:2117/428449">
   <metsHdr CREATEDATE="2026-04-13T09:33:02Z">
      <agent ROLE="CUSTODIAN" TYPE="ORGANIZATION">
         <name>RECERCAT</name>
      </agent>
   </metsHdr>
   <dmdSec ID="DMD_2117_428449">
      <mdWrap MDTYPE="MODS">
         <xmlData xmlns:mods="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
            <mods:mods xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
               <mods:name>
                  <mods:role>
                     <mods:roleTerm type="text">author</mods:roleTerm>
                  </mods:role>
                  <mods:namePart>Qureshi, Abdul Rehman</mods:namePart>
               </mods:name>
               <mods:name>
                  <mods:role>
                     <mods:roleTerm type="text">author</mods:roleTerm>
                  </mods:role>
                  <mods:namePart>Asensio Garcia, Adrian</mods:namePart>
               </mods:name>
               <mods:name>
                  <mods:role>
                     <mods:roleTerm type="text">author</mods:roleTerm>
                  </mods:role>
                  <mods:namePart>Imran, Muhammad</mods:namePart>
               </mods:name>
               <mods:name>
                  <mods:role>
                     <mods:roleTerm type="text">author</mods:roleTerm>
                  </mods:role>
                  <mods:namePart>García Almiñana, Jordi</mods:namePart>
               </mods:name>
               <mods:name>
                  <mods:role>
                     <mods:roleTerm type="text">author</mods:roleTerm>
                  </mods:role>
                  <mods:namePart>Masip Bruin, Xavier</mods:namePart>
               </mods:name>
               <mods:originInfo>
                  <mods:dateIssued encoding="iso8601">2025-06</mods:dateIssued>
               </mods:originInfo>
               <mods:identifier type="none"/>
               <mods:abstract>A Digital Twin (DT) is a virtual representation of both cyber and physical objects. Initially, the concept was introduced to optimize manufacturing products, aimed at validating and verifying their behavior along their lifecycle. However, in the recent years and with the advent of Industry 4.0, it has also gained huge attention in the cybersecurity arena. Indeed, using a DT is seen as an strategy to automate, monitor, simulate, and diagnose cyber–physical systems behavior, aimed at making them to be secure. The DT can provide security in multiple domains such as manufacturing, aerospace, automotive, construction, smart grid, smart cities, and smart transportation. The fundamentals of a DT is a combination of data and a model of the system. To this end, this survey aims to explore current efforts on DT modeling techniques, and how these DT models capture the behavior of the system to enhance cybersecurity. The study focuses on the construction of behavioral models, techniques, tools, and technologies of DT used for specific security applications. The purpose of the discussion carried out in this survey is to illustrate the reader on how these behavioral models adapt to different security applications. In addition, the paper also analyzes and classifies current DT literature based on use cases, type of DT study, tools, and various DT operation modes with their specific security application. The findings of this survey describe security applications being enhanced by DT, and how the combination of key technologies facilitating Industry 4.0 (i.e., AI, IoT, Big Data and Cloud Computing, among others), are accelerating the adoption of DT as a solution for next generation security applications. Finally, this survey highlights relevant research gaps that need to be addressed before the wide adoption of DT in cybersecurity.The work leading to this publication was partially co-funded by the Spanish Ministry of Science and Innovation under grant PID2021-124463OB-I00 funded by MCIN/AEI/10.13039/501100011033 and by ERDF A way of making Europe, by the Catalan Government under contract 2021 SGR 00326, as well as by the European Union’s Horizon Europe under the HE COBALT project , Grant Agreement no. 101119602.Peer ReviewedPostprint (published version)</mods:abstract>
               <mods:language>
                  <mods:languageTerm authority="rfc3066"/>
               </mods:language>
               <mods:accessCondition type="useAndReproduction">http://creativecommons.org/licenses/by-nc/4.0/ Open Access Attribution-NonCommercial 4.0 International</mods:accessCondition>
               <mods:subject>
                  <mods:topic>Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica</mods:topic>
               </mods:subject>
               <mods:subject>
                  <mods:topic>Digital Twins</mods:topic>
               </mods:subject>
               <mods:subject>
                  <mods:topic>CyberSecurity</mods:topic>
               </mods:subject>
               <mods:subject>
                  <mods:topic>IoT</mods:topic>
               </mods:subject>
               <mods:subject>
                  <mods:topic>Behavior modeling</mods:topic>
               </mods:subject>
               <mods:subject>
                  <mods:topic>Cyberphysical systems</mods:topic>
               </mods:subject>
               <mods:subject>
                  <mods:topic>Security applications</mods:topic>
               </mods:subject>
               <mods:subject>
                  <mods:topic>Security tools</mods:topic>
               </mods:subject>
               <mods:titleInfo>
                  <mods:title>A survey on security enhancing Digital Twins: models, applications and tools</mods:title>
               </mods:titleInfo>
               <mods:genre>Article</mods:genre>
            </mods:mods>
         </xmlData>
      </mdWrap>
   </dmdSec>
   <structMap LABEL="DSpace Object" TYPE="LOGICAL">
      <div TYPE="DSpace Object Contents" ADMID="DMD_2117_428449"/>
   </structMap>
</mets></metadata></record></GetRecord></OAI-PMH>