{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T01:50:59Z","timestamp":1769824259980,"version":"3.49.0"},"reference-count":182,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W91NF-20-2-0140"],"award-info":[{"award-number":["W91NF-20-2-0140"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tnsm.2021.3091391","type":"journal-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T19:47:41Z","timestamp":1624391261000},"page":"706-728","source":"Crossref","is-referenced-by-count":4,"title":["Diversity-by-Design for Dependable and Secure Cyber-Physical Systems: A Survey"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8785-8437","authenticated-orcid":false,"given":"Qisheng","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Falls Church, VA, USA"}]},{"given":"Abdullah Zubair","family":"Mohammed","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, Arlington, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5293-0363","authenticated-orcid":false,"given":"Zelin","family":"Wan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Falls Church, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5908-4662","authenticated-orcid":false,"given":"Jin-Hee","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Falls Church, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3279-2965","authenticated-orcid":false,"given":"Terrence J.","family":"Moore","sequence":"additional","affiliation":[{"name":"Network Science Division, U.S. Army Research Laboratory, Adelphi, MD, USA"}]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44499-8_24"},{"key":"ref172","year":"2020","journal-title":"Xen Project"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.18"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8644535"},{"key":"ref173","first-page":"260","article-title":"Transparent runtime randomization for security","author":"xu","year":"2003","journal-title":"Proc 22nd Int Symp Rel Distrib Syst"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.04.011"},{"key":"ref178","article-title":"Vulnerability-aware resilient networks: Software diversity-based network adaptation","author":"zhang","year":"2020","journal-title":"IEEE Trans Netw Service Manag"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2516916"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/1641876.1641898"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TELSKS.1999.804748"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680487"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2718489"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3191680"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DSC50466.2020.00065"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3277666"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1049\/PBSE010E_ch12"},{"key":"ref35","article-title":"Mitigating buffer overflows by operating system randomization","author":"chew","year":"2002"},{"key":"ref34","article-title":"Software diversity for information security","author":"chen","year":"2005","journal-title":"Proc Workshop Econ Inf Security (WEIS)"},{"key":"ref181","first-page":"9","article-title":"Simulation-based approaches to studying effectiveness of moving-target network defense","author":"zhuang","year":"2012","journal-title":"Proc Nat Symp Moving Target Res"},{"key":"ref180","first-page":"388","article-title":"Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing","volume":"2005","author":"zhou","year":"2005","journal-title":"Proc IACR Cryptol ePrint Archive"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7018202"},{"key":"ref28","article-title":"Authentication security through diversity and redundancy for cloud computing","author":"carvalho","year":"2014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-8454-0"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148371"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENG.2016.02.012"},{"key":"ref20","year":"2020","journal-title":"BlueOnix Network Datasets"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsci.2018.05.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.06.004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IECON43393.2020.9255062"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/32.41339"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"ref26","first-page":"1","article-title":"Large scale malware collection: Lessons learned","author":"canto","year":"2008","journal-title":"Proc IEEE SRDS Workshop Sharing Field Data Exp Meas Resilience Distrib Comput Syst"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.008"},{"key":"ref25","author":"butler","year":"2020","journal-title":"The Open Source IA-32 Emulation Project"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2905295"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28005-5_24"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2015.84"},{"key":"ref153","author":"stouffer","year":"2011","journal-title":"Guide to industrial control systems (ICS) security"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2017.0722"},{"key":"ref155","year":"2006","journal-title":"Network Workbench Tool Indiana University Northeastern University and University of Michigan"},{"key":"ref150","article-title":"Smart collaborative balancing for dependable network components in cyber-physical systems","author":"song","year":"2020","journal-title":"IEEE Trans Ind Informat"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1079\/PHN2005912"},{"key":"ref151","first-page":"1","article-title":"Where&#x2019;s the FEEB? The effectiveness of instruction set randomization","volume":"10","author":"sovarel","year":"2005","journal-title":"Proc Usenix Security Symp"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542598"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_19"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23078"},{"key":"ref59","first-page":"6","article-title":"Diversity for safety and security in embedded systems","volume":"26","author":"gashi","year":"2014","journal-title":"Proc Int Conf Depend Syst Netw"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2009.14"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2180"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900550"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359834"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2014.02.006"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245330"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/NORCHIP.2019.8906945"},{"key":"ref166","year":"2020","journal-title":"VirusTotal"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.89.6.1008"},{"key":"ref164","first-page":"6","article-title":"On the use of smart sensors, common cause failure and the need for diversity","author":"van der meulen","year":"2004","journal-title":"Proc 6th Int Symp Program Electron Syst Safety Relat Appl"},{"key":"ref163","year":"1999","journal-title":"KDD Cup 1999 data"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.3390\/data5030064"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219719"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64793-3_16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2011.25"},{"key":"ref6","first-page":"149","article-title":"On the implementation of n-version programming for software fault tolerance during execution","author":"avizienis","year":"1977","journal-title":"Proc Compsac"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2009.5340029"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659219"},{"key":"ref49","first-page":"738","article-title":"Defining biodiversity","volume":"24","author":"delong","year":"1996","journal-title":"Wildlife Soc Bull"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"ref157","first-page":"43","article-title":"COTS diversity based intrusion detection and application to Web servers","author":"totel","year":"2005","journal-title":"Proc Int Workshop Recent Adv Intrusion Detect"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2881672"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1986.13527"},{"key":"ref46","year":"2020","journal-title":"Common Vulnerabilities and Exposures (CVE)"},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.4337\/9781847202895","author":"crouch","year":"2006","journal-title":"The Diversity of Democracy Corporatism Social Order and Political Conflict"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741882"},{"key":"ref47","first-page":"25","article-title":"Transient-based identification of wireless sensor nodes","author":"danev","year":"2009","journal-title":"Proc Int Conf Inf Process Sensor Netw"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2008.09.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23264"},{"key":"ref43","first-page":"105","article-title":"N-variant systems: A secretless framework for security through diversity","author":"cox","year":"2006","journal-title":"Proc Usenix Security Symp"},{"key":"ref127","author":"parkour","year":"2011","journal-title":"11 355+ Malicious Documents-Archive for Signature Testing and Research"},{"key":"ref126","year":"2020","journal-title":"Winning the Future with Science and Technology for 21st Century Smart Systems"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030101"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2005.31"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.32"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494997"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_9"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.48"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/765891.766146"},{"key":"ref70","year":"2020","journal-title":"IDA Home Page"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2983468.2983479"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3005714"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.07.007"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0403723101"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2016.01.002"},{"key":"ref133","article-title":"A specialization toolkit to increase the diversity of operating systems","author":"pu","year":"1996","journal-title":"Proc ICMAS Workshop Immunity Based Syst"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.4108\/eai.11-12-2018.156032"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.3138\/9781442682399"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134764"},{"key":"ref132","first-page":"211","article-title":"A binary rewriting defense against stack based buffer overflow attacks","author":"prasad","year":"2003","journal-title":"Proc USENIX Annu Techn Conf Gen Track"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_8"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858319"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35697-6_19"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/227210.227228"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.31274\/etd-180810-2601","article-title":"Physical layer identification: Methodology, security, and origin of variation","author":"gerdes","year":"2011"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028912"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2736886"},{"key":"ref61","first-page":"6","article-title":"Device identification via analog signal fingerprinting: A matched filter approach","author":"gerdes","year":"2006","journal-title":"Proc NDSS"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2017.8117197"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.020"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174911"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-024453-2.50014-0"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.42"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2213080"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2897248"},{"key":"ref143","year":"2020","journal-title":"SecurityFocus"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368332"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196556"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.009"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2015.37"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2017.00052"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/384192.384195"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24025"},{"key":"ref108","author":"leskovec","year":"2014","journal-title":"SNAP Datasets Stanford large network dataset collection"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/BEC.2016.7743719"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC-7.2008.15"},{"key":"ref93","first-page":"242","author":"kephart","year":"1999","journal-title":"Blueprint for a Computer Immune System"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575282"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref105","first-page":"1","article-title":"SGNET: Automated protocol learning for the observation of malicious threats","author":"leita","year":"2008","journal-title":"Proc 7th Eur Depend Comput Conf (EDDC)"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858391"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1080\/23335777.2019.1624620"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029623"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.1999.802906"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_11"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70802"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311930"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897863"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0101"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868374"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2809665"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1095714.1095759"},{"key":"ref13","article-title":"Code obfuscation literature survey","volume":"19","author":"balakrishnan","year":"2005","journal-title":"Proc CS 701 Construct Compilers"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2936488"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1140\/epjst\/e2012-01703-3"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_8"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1201\/9781315155852"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2807593"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.03.004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.15"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref119","first-page":"52","article-title":"N-version programming for the detection of zero-day exploits","author":"nagy","year":"2006","journal-title":"Proc IEEE Topical Conf Cybersecurity"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542597"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1992.217601"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-9198-9_10"},{"key":"ref116","first-page":"147","article-title":"Functional diversity design of safety-related systems","volume":"2","author":"malynyak","year":"2018","journal-title":"Educational Review"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.05.004"},{"key":"ref115","first-page":"28","article-title":"Experiments on cots diversity as an intrusion detection and tolerance mechanism","author":"majorczyk","year":"2007","journal-title":"Proc 1st Workshop Recent Adv Intrusion-Tolerant Syst (WRAITS)"},{"key":"ref120","first-page":"1","article-title":"Software diversity: Security, entropy and game theory","author":"neti","year":"2012","journal-title":"Proc HotSec"},{"key":"ref89","volume":"39","author":"jensen","year":"2011","journal-title":"Graph Coloring Problems"},{"key":"ref121","year":"2020","journal-title":"DDoS Solutions"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.11"},{"key":"ref123","first-page":"91","article-title":"CloudAV: N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proc Usenix Security Symp"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.1.211"},{"key":"ref86","year":"1992","journal-title":"ISO\/TC Document ISO\/TC 176\/SC 1 N 93"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_8"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808487"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9732399\/09462505.pdf?arnumber=9462505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,5]],"date-time":"2023-11-05T06:35:37Z","timestamp":1699166137000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9462505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":182,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3091391","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}