[
Alladi, T., Chamola, V. and Zeadally, S. (2020). Industrial control systems: Cyberattack trends and countermeasures, Computer Communications 155: 1–8.10.1016/j.comcom.2020.03.007
]Search in Google Scholar
[
Archer, D.W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J.I., Smart, N.P. and Wright, R.N. (2018). From keys to databases—Real-world applications of secure multi-party computation, The Computer Journal 61(12): 1749–1771.10.1093/comjnl/bxy090
]Search in Google Scholar
[
Avizienis, A. (1985). The N-version approach to fault-tolerant software, IEEE Transactions on Software Engineering SE-11(12): 1491–1501.10.1109/TSE.1985.231893
]Search in Google Scholar
[
Avizienis, A., Laprie, J.-C., Randell, B. and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing 1(1): 11–33.10.1109/TDSC.2004.2
]Search in Google Scholar
[
Babay, A., Tantillo, T., Aron, T., Platania, M. and Amir, Y. (2018). Network-attack-resilient intrusion-tolerant SCADA for the power grid, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Luxemburg, Luxemburg, pp. 255–266.
]Search in Google Scholar
[
Bondavalli, A., Di Giandomenico, F. and Xu, J. (1993). A cost-effective and flexible scheme for software fault tolerance, Computer Systems: Science & Engineering 8(4): 234–244.
]Search in Google Scholar
[
Di Giandomenico, F. and Masetti, G. (2021). Basic aspects in redundancy-based intrusion tolerance, 14th International Conference on Computational Intelligence in Security for Information Systems/12th International Conference on European Transnational Educational, Bilbao, Spain, pp. 192–202.
]Search in Google Scholar
[
Di Giandomenico, F. and Strigini, L. (1990). Adjudicators for diverse-redundant components, Proceedings of the 9th Symposium on Reliable Distributed Systems, Huntsville, USA, pp. 114–123.
]Search in Google Scholar
[
Distler, T. (2022). Byzantine fault-tolerant state-machine replication from a system’s perspective, ACM Computing Surveys 54(1): 1–38.10.1145/3436728
]Search in Google Scholar
[
Dohi, T., Trivedi, K. S. and Avritzer, A. (2020). Hand-book of Software Aging and Rejuvenation: Fundamentals, Methods, Applications, and Future Directions, WSPC, Singapore.10.1142/11673
]Search in Google Scholar
[
Garcia, M., Bessani, A., Gashi, I., Neves, N. and Obelheiro, R. (2014). Analysis of operating system diversity for intrusion tolerance, Software—Practice & Experience 44(6): 735–770.10.1002/spe.2180
]Search in Google Scholar
[
Gashi, I., Povyakalo, A. and Strigini, L. (2016). Diversity, safety and security in embedded systems: Modelling adversary effort and supply chain risks, 12th European Dependable Computing Conference (EDCC), Gothenburg, Sweden, pp. 13–24.
]Search in Google Scholar
[
Gorbenko, A., Romanovsky, A., Tarasyuk, O. and Biloborodov, O. (2020). From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures, IEEE Transactions on Reliability 69(1): 22–39.10.1109/TR.2019.2897248
]Search in Google Scholar
[
Haphuriwat, N. and Bier, V.M. (2011). Trade-offs between target hardening and overarching protection, European Journal of Operational Research 213(1): 320–328.10.1016/j.ejor.2011.03.035
]Search in Google Scholar
[
Hardekopf, B., Kwiat, K. and Upadhyaya, S. (2001). Secure and fault-tolerant voting in distributed systems, IEEE Aerospace Conference Proceedings, Gothenburg, Sweden, pp. 1117–1126.
]Search in Google Scholar
[
Khan, M. and Babay, A. (2021). Toward intrusion tolerance as a service: Confidentiality in partially cloud-based BFT systems, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN21), Taipei, Taiwan, pp. 14–25.
]Search in Google Scholar
[
Khraisat, A., Gondal, I., Vamplew, P. and Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges, Cybersecurity 2(1): 1–20.10.1186/s42400-019-0038-7
]Search in Google Scholar
[
Laprie, J.-C., Arlat, J., Beounes, C. and Kanoun, K. (1990). Definition and analysis of hardware-and software-fault-tolerant architectures, Computer 23(7): 39–51.10.1109/2.56851
]Search in Google Scholar
[
Littlewood, B. and Strigini, L. (2000). A discussion of practices for enhancing diversity in software designs, Technical Report DISPO LS DI TR-04 V1 1d, Centre for Software Reliability, City University, London, https://openaccess.city.ac.uk/id/eprint/275/.
]Search in Google Scholar
[
Lyu, M.R. (1995). Software Fault Tolerance, John Wiley & Sons Ltd, Hoboken.
]Search in Google Scholar
[
Majdzik, P. (2022). A feasible schedule for parallel assembly tasks in flexible manufacturing systems, International Journal of Applied Mathematics and Computer Science 32(1): 51–63, DOI: 10.34768/amcs-2022-0005.
]Ouvrir le DOISearch in Google Scholar
[
Mejdi, S., Messaoud, A. and Ben Abdennour, R. (2020). Fault tolerant multicontrollers for nonlinear systems: A real validation on a chemical process, International Journal of Applied Mathematics and Computer Science 30(1): 61–74, DOI: 10.34768/amcs-2020-0005.
]Ouvrir le DOISearch in Google Scholar
[
Nascimento, A.S., Rubira, C.M.F., Burrows, R. and Castor, F. (2013). A systematic review of design diversity-based solutions for fault-tolerant SOAs, Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, EASE’13, Porto de Galinhas, Brazil, pp. 107–118.
]Search in Google Scholar
[
Obelheiro, R., Bessani, A., Lung, L. and Correia, M. (2006). How practical are intrusion-tolerant distributed systems?, Technical Report DI-FCUL TR 06–15, Department of Informatics, University of Lisbon, Lisbon, https://repositorio.ul.pt/handle/10451/14093.
]Search in Google Scholar
[
Puig, V., Sauter, D., Aubrun, C. and Schulte, H. (Eds) (2018). Advanced Diagnosis and Fault-Tolerant Control Methods (special section), International Journal of Applied Mathematics and Computer Science 28(2): 233–333.
]Search in Google Scholar
[
Pullum, L.L. (2001). Software Fault Tolerance Techniques and Implementation, Artech House, Inc., Canton St. Norwood.
]Search in Google Scholar
[
Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S. and Fang, B. (2020). A survey on access control in the age of Internet of Things, IEEE Internet of Things Journal 7(6): 4682–4696.10.1109/JIOT.2020.2969326
]Search in Google Scholar
[
Randell, B. (1975). System structure for software fault tolerance, IEEE Transactions on Software Engineering SE-1(2): 220–232.10.1109/TSE.1975.6312842
]Search in Google Scholar
[
Randell, B. and Xu, J. (1994). The evolution of the recovery block concept, in M. Lyu (Ed), Software Fault Tolerance, Vol. 3, Wiley, Chichester, pp. 1–22.
]Search in Google Scholar
[
Rodriguez, M., Kwiat, K.A. and Kamhoua, C.A. (2015). Modeling fault tolerant architectures with design diversity for secure systems, IEEE Military Communications Conference (MILCOM), Tampa, USA, pp. 1254–1263.
]Search in Google Scholar
[
Saidane, A., Nicomette, V. and Deswarte, Y. (2009). The design of a generic intrusion-tolerant architecture for web servers, IEEE Transactions on Dependable and Secure Computing 6(1): 45–58.10.1109/TDSC.2008.1
]Search in Google Scholar
[
Scarfone, K. and Mell, P. (2010). Intrusion detection and prevention systems, in P. Stavroulakis and M. Stamp (Eds), Handbook of Information and Communication Security, Springer, Berlin/Heidelberg, pp. 177–192.10.1007/978-3-642-04117-4_9
]Search in Google Scholar
[
Scott, R., Gault, J. and McAllister, D. (1985). The consensus recovery block, Total System Reliability Symposium, Gaithersburg, USA, pp. 74–85.
]Search in Google Scholar
[
Sousa, P., Bessani, A. and Obelheiro, R. (2008). The forever service for fault/intrusion removal, Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems, Glasgow, UK,p.16.
]Search in Google Scholar
[
Tarraf, D.C., Kamhoua, C.A., Kwiat, K.A. and Njilla, L. (2017). Majority is not always supreme: Less can be more when voting with compromised nodes, IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Singapore, pp. 9–12.
]Search in Google Scholar
[
Veríssimo, P.E., Neves, N.F. and Correia, M.P. (2003). Intrusion-tolerant architectures: Concepts and design, in R. Lemos et al. (Eds), Architecting Dependable Systems, Springer, Berlin, pp. 3–36.10.1007/3-540-45177-3_1
]Search in Google Scholar
[
Vöelp, M. and Verissimo, P. (2018). Intrusion-tolerant autonomous driving, IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), Singapore, Singapore, pp. 130–133.
]Search in Google Scholar
[
Wang, L., Ren, S., Korel, B., Kwiat, K.A. and Salerno, E. (2014). Improving system reliability against rational attacks under given resources, IEEE Transactions on Systems, Man, and Cybernetics: Systems 44(4): 446–456.10.1109/TSMC.2013.2263126
]Search in Google Scholar
[
Ylmaz, E.N. and Gänen, S. (2018). Attack detection/prevention system against cyber attack in industrial control systems, Computers & Security 77: 94–105.10.1016/j.cose.2018.04.004
]Search in Google Scholar
[
Zhang, F., Kodituwakku, H.A.D.E., Hines, J.W. and Coble, J. (2019). Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data, IEEE Transactions on Industrial Informatics 15(7): 4362–4369.10.1109/TII.2019.2891261
]Search in Google Scholar
[
Zhou, Y., Han, M., Liu, L., He, J.S. and Wang, Y. (2018). Deep learning approach for cyberattack detection, IEEE INFOCOM 2018—IEEE Conference on Computer Communications Workshops, Honolulu, USA, pp. 262–267.
]Search in Google Scholar