Prime: Byzantine replication under attack. Dependable and Secure Computing, IEEE Transactions on, vol.8, issue.4, pp.564-577, 2011. ,
DOI : 10.1109/tdsc.2010.70
URL : http://www.cnds.jhu.edu/pub/papers/Prime_tdsc_accepted.pdf
The Crutial Way of Critical Infrastructure Protection, IEEE Security & Privacy Magazine, vol.6, issue.6, pp.44-51, 2008. ,
DOI : 10.1109/MSP.2008.158
An experimental evaluation on reliability features of N-version programming, Int. Symp. on Software Reliability Engineering (IS- SRE'05, 2005. ,
Secure control: Towards survivable cyberphysical systems, Int. Conf. on Distributed Computing Systems, 2008. ,
DOI : 10.1109/icdcs.workshops.2008.40
URL : http://www.vs.inf.ethz.ch/edu/HS2011/CPS/papers/cardenas08_secure-control.pdf
N-variant systems: A secretless framework for security through diversity, pp.105-120, 2006. ,
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
The ANDIX research OS — ARM TrustZone meets industrial control systems security, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), 2015. ,
DOI : 10.1109/INDIN.2015.7281715
Design and Implementation of a Secure Modbus Protocol, Conf. on Critical Infrastructure Protection, 2009. ,
DOI : 10.1007/978-3-540-24852-1_19
Self-healing systems ??? survey and synthesis, Decision Support Systems, vol.42, issue.4, pp.2164-2185, 2007. ,
DOI : 10.1016/j.dss.2006.06.011
Using innovative instructions to create trustworthy software solutions, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, 2013. ,
DOI : 10.1145/2487726.2488370
Recommended practice: Improving industrial control systems cybersecurity with defense-in-depth strategies, Tech. rep., U.S. Homeland Security, 2009. ,
Closed loop design for software rejuvenation, Workshop on Self-Healing, Adaptive, and Self-Managed Systems, 2002. ,
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems, 2008 Third International Conference on Availability, Reliability and Security, pp.319-326, 2008. ,
DOI : 10.1109/ARES.2008.68
Scads separated control-and data-stacks, Int. Conf. on Security and Privacy in Communication Systems, 2014. ,
DOI : 10.4108/eai.5-10-2015.150477
URL : https://doi.org/10.4108/eai.5-10-2015.150477
Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/MSP.2011.67
Converting finite automata to regular expressions . online (2012), http://www.fit.vutbr.cz/~izemek/grants.php.cs?file= %2Fproj%2F589%2FPresentations%2FPB05-Converting-FAs-To-REs, p.589 ,
Defending against cyber threats to building management systems. online (FM Magazine)/sectors/defe nding-against-cyber-threats-to-building-management-systems, 2016. ,
Towards a Practical Survivable Intrusion Tolerant Replication System, 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, pp.242-252 ,
DOI : 10.1109/SRDS.2014.16
URL : http://www.cnds.jhu.edu/pub/papers/cnds-2014-1.pdf
Multivariant program execution: Using multi-core systems to defuse buffer-overflow vulnerabilities, Complex, Intelligent and Software Intensive Systems (CISIS), 2008. ,
DOI : 10.1109/cisis.2008.136
The effect of diverse hardware platforms on N-version programming in embedded systems-an empirical evaluation, Workshop on Dependable Embedded Sytems (WDES). Citeseer, 2006. ,
Specification-based anomaly detection, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586146
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.4, 2010. ,
DOI : 10.1109/TPDS.2009.83
URL : http://www.di.fc.ul.pt/~nuno/PAPERS/TPDS09.pdf
Guide to Industrial Control Systems (ICS) security, NIST Special Publication, 2014. ,
DOI : 10.6028/nist.sp.800-82r2
COTS Diversity Based Intrusion Detection and Application to Web Servers, Int. Workshop on Recent Advances in Intrusion Detection, 2005. ,
DOI : 10.1007/11663812_3
URL : https://hal.archives-ouvertes.fr/hal-00356396
Comparisons of self-healing fault-tolerant computing schemes, World Congress on Engineering and Computer Science, 2010. ,
Travelling through wormholes, ACM SIGACT News, vol.37, issue.1, 2006. ,
DOI : 10.1145/1122480.1122497
Efficient Byzantine Fault-Tolerance, IEEE Transactions on Computers, vol.62, issue.1, pp.16-30, 2013. ,
DOI : 10.1109/TC.2011.221
URL : http://docs.di.fc.ul.pt/jspui/bitstream/10455/2966/1/08-29.pdf
Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, pp.396-403, 2013. ,
DOI : 10.1109/UIC-ATC.2013.80
A model of secretless security in N-variant systems, Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS-2), 2009. ,
Building Verifiable Trusted Path on Commodity x86 Computers, 2012 IEEE Symposium on Security and Privacy, pp.616-630, 2012. ,
DOI : 10.1109/SP.2012.42
URL : http://doi.org/10.1109/sp.2012.42