The N-Version Approach to Fault-Tolerant Software, IEEE Transactions on Software Engineering, vol.11, issue.12, pp.1491-1501, 1985. ,
DOI : 10.1109/TSE.1985.231893
Impact of IT monoculture on behavioral end host intrusion detection, Proceedings of the 1st ACM workshop on Research on enterprise networking, WREN '09, pp.27-36, 2009. ,
DOI : 10.1145/1592681.1592686
URL : https://hal.archives-ouvertes.fr/hal-00795994
Randomized instruction set emulation, ACM Transactions on Information and System Security, vol.8, issue.1, pp.3-40, 2005. ,
DOI : 10.1145/1053283.1053286
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.9705
Towards ecology-inspired software engineering, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00694276
N-version programming: A fault-tolerance approach to reliability of software operation Morphological plasticity in clonal plants: the foraging concept reconsidered, Proc. of the Int. Symp. on Fault-Tolerant Computing (FTCS'78), pp.3-9143, 1978. ,
Indices, Graphs and Null Models: Analyzing Bipartite Ecological Networks, The Open Ecology Journal, vol.2, issue.1, pp.7-24, 2009. ,
DOI : 10.2174/1874213000902010007
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.323.9930
Network structure and biodiversity loss in food webs: robustness increases with connectance, Ecology Letters, vol.48, issue.4, pp.558-567, 2002. ,
DOI : 10.1038/35006555
Generating diverse software versions with genetic programming: an experimental study, IEE Proceedings - Software, vol.145, issue.6, pp.228-236, 1998. ,
DOI : 10.1049/ip-sen:19982444
Building diverse computer systems, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133), pp.67-72, 1997. ,
DOI : 10.1109/HOTOS.1997.595185
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.3961
Adaptive Radiation: Contrasting Theory with Data, Science, vol.323, issue.5915, pp.732-737, 2009. ,
DOI : 10.1126/science.1157966
Safe software updates via multi-version execution, 2013 35th International Conference on Software Engineering (ICSE), pp.612-621, 2013. ,
DOI : 10.1109/ICSE.2013.6606607
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.2962
Countering code-injection attacks with instruction-set randomization, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.272-280, 2003. ,
DOI : 10.1145/948109.948146
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.9413
An experimental evaluation of the assumption of independence in multiversion programming, IEEE Transactions on Software Engineering, vol.12, issue.1, pp.96-109, 1986. ,
DOI : 10.1109/TSE.1986.6312924
Genprog: A generic method for automatic software repair, IEEE Transactions on Software Engineering, vol.38, pp.54-72, 2012. ,
Polymorphing Software by Randomizing Data Structure Layout, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.107-126, 2009. ,
DOI : 10.1007/978-3-540-87403-4_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.4174
The Trophic-Dynamic Aspect of Ecology, Ecology, vol.23, issue.4, pp.399-417, 1942. ,
DOI : 10.2307/1930126
The diversity???stability debate, Nature, vol.405, issue.6783, pp.405228-233, 2000. ,
DOI : 10.1038/35012234
A classification and comparison framework for software architecture description languages. Software Engineering, IEEE Transactions on, vol.26, issue.1, pp.70-93, 2000. ,
URL : https://hal.archives-ouvertes.fr/hal-00444077
Frequency-Dependent Selection Predicts Patterns of Radiations and Biodiversity, PLoS Computational Biology, vol.1, issue.8, p.1000892, 2010. ,
DOI : 10.1371/journal.pcbi.1000892.s001
Empirical evidence of large-scale diversity in API usage of object-oriented software, 2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2013. ,
DOI : 10.1109/SCAM.2013.6648183
URL : https://hal.archives-ouvertes.fr/hal-00844753
Taming Dynamically Adaptive Systems using models and aspects, 2009 IEEE 31st International Conference on Software Engineering, pp.122-132, 2009. ,
DOI : 10.1109/ICSE.2009.5070514
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.780
Runtime software adaptation, Companion of the 13th international conference on Software engineering , ICSE Companion '08, pp.899-910, 2008. ,
DOI : 10.1145/1370175.1370181
Which is riskier, Communications of the ACM, vol.50, issue.8, p.112, 2007. ,
DOI : 10.1145/1278201.1278232
System structure for software fault tolerance, IEEE Trans. on Software Engineering (TSE), issue.2, pp.220-232, 1975. ,
DOI : 10.1007/978-1-4612-6315-9_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.578
Obtaining and reasoning about good enough software, Proceedings of the 49th Annual Design Automation Conference on, DAC '12, pp.930-935, 2012. ,
DOI : 10.1145/2228360.2228526
Managing performance vs. accuracy trade-offs with loop perforation, Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, SIGSOFT/FSE '11, pp.124-134, 2011. ,
DOI : 10.1145/2025113.2025133
Risks of monoculture, Communications of the ACM, vol.47, issue.3, p.120, 2004. ,
DOI : 10.1145/971617.971650
The Koala component model for consumer electronics software, Computer, vol.33, issue.3, pp.78-85, 2000. ,
DOI : 10.1109/2.825699
Biodiversity and ecosystem productivity in a fluctuating environment: The insurance hypothesis, Proceedings of the National Academy of Sciences, pp.1463-1468, 1999. ,
DOI : 10.1073/pnas.96.4.1463