A. Bangalore and A. Sood, Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT), 2009 Second International Conference on Dependability, pp.60-65, 2009.
DOI : 10.1109/DEPEND.2009.15

S. Blackmon and J. Nguyen, Storage: High-availability file server with heartbeat, System Administration, pp.24-32, 2001.

G. Bronevetsky, D. Marques, K. Pingali, and P. Stodghill, Automated application-level checkpointing of MPI programs, ACM SIGPLAN Notices, vol.38, issue.10, pp.84-94, 2003.
DOI : 10.1145/966049.781513

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.365.8549

R. Brown, Stuxnet worm causes industry concern for security firmsStuxnet-worm-causes-industry-concern-for-security- firms.html), 2010.

G. Carl, G. Kesidis, R. Brooks, and S. Rai, Denial-of-service attack-detection techniques, IEEE Internet Computing, vol.10, issue.1, pp.82-89, 2006.
DOI : 10.1109/MIC.2006.5

Y. Chen, K. Li, and J. Plank, CLIP, Proceedings of the 1997 ACM/IEEE conference on Supercomputing (CDROM) , Supercomputing '97, p.33, 1997.
DOI : 10.1145/509593.509626

C. Clark, K. Fraser, S. Hand, J. Hansen, E. Jul et al., Live migration of virtual machines, Proceedings of the Second Conference on Symposium on Networked Systems Design and Implementation, pp.273-286, 2005.

I. Habib, Virtualization with KVM, Linux Journal (www.linuxjournal.com, issue.9764, 2008.

Y. Huang, D. Arsenault, and A. Sood, Closing cluster attack windows through server redundancy and rotations, Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid, p.21, 2006.

Y. Huang, D. Arsenault, and A. Sood, Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security, Journal of Networks, vol.1, issue.5, pp.21-30, 2006.
DOI : 10.4304/jnw.1.5.21-30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.8497

Y. Huang and A. Ghosh, Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services, 2009 Eighth IEEE International Symposium on Network Computing and Applications, pp.114-117, 2009.
DOI : 10.1109/NCA.2009.37

Y. Huang, A. Ghosh, T. Bracewell, and B. Mastropietro, A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.188-193, 2010.
DOI : 10.1109/DSNW.2010.5542597

K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer, Modeling Modern Network Attacks and Countermeasures Using Attack Graphs, 2009 Annual Computer Security Applications Conference, pp.117-126, 2009.
DOI : 10.1109/ACSAC.2009.21

URL : http://cis.ksu.edu/~zhangs84/ReadingList/MIT09ACSAC.pdf

K. Kolyshkin, Virtualization in Linux, OpenVZ (ftp.openvz.org/doc/open vz-intro.pdf), 2006.

S. Lee, T. Johnson, and R. Eigenmann, Cetus ??? An Extensible Compiler Infrastructure for Source-to-Source Transformation, Proceedings of the Sixteenth International Workshop on Languages and Compilers for Parallel Computing, pp.539-553, 2003.
DOI : 10.1007/978-3-540-24644-2_35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.5378

C. Lxc-linux, lxc man pages (lxc.sourceforge.net/index

S. National and . Council, Cybersecurity Progress after President Obama's Address, The White House, 2010.

R. Rabbat, T. Mcneal, and T. Burke, A high-availability clustering architecture with data integrity guarantees, Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp.178-182, 2001.
DOI : 10.1109/CLUSTR.2001.959974

G. Rodriguez, M. Martin, P. Gonzalez, J. Tourino, and R. Doallo, CPPC: A compiler-assisted tool for portable checkpointing of message-passing applications , Concurrency and Computation: Practice and Experience, pp.749-766, 2010.

E. Sarmiento, Securing FreeBSD using Jail, System Administration, pp.31-37, 2001.

J. Smart, K. Hock, and S. Csomor, Cross-Platform GUI Programming with wxWidgets, 2005.

A. Sood, Intrusion tolerance to mitigate attacks that persist, presented at the Secure and Resilient Cyber Architectures Conference, 2010.

G. Stellner, CoCheck: checkpointing and process migration for MPI, Proceedings of International Conference on Parallel Processing, pp.526-531, 1996.
DOI : 10.1109/IPPS.1996.508106

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.5240