{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:53:16Z","timestamp":1760597596359},"reference-count":30,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"abstract":"<jats:p>Replication and value selection through voting are commonly used approaches to tolerating naturally caused failures. Without considering intentionally introduced failures, such as failures caused by attacks, having more replication or residency often makes the system more reliable. However, when both the reliability of individual replicas and the existence of attackers are taken into consideration, the number of replicas that participate in a voting process has significant impact on system reliability. In this paper, the authors study the problem of deciding the optimal number of participating voters that maximizes the reliability of voting results under two different types of attacks, i.e., random attack and targeted attack, and develop algorithms to find the optimal voting strategy. A set of experiments are performed to illustrate how the optimal voting strategy varies under different system settings and how the number of voting participants affects the system's reliability.<\/jats:p>","DOI":"10.4018\/ijsse.2013100102","type":"journal-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T18:13:06Z","timestamp":1393351986000},"page":"25-46","source":"Crossref","is-referenced-by-count":2,"title":["Optimal Voting Strategy against Random and Targeted Attacks"],"prefix":"10.4018","volume":"4","author":[{"given":"Li","family":"Wang","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Zheng","family":"Li","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Shangping","family":"Ren","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Kevin","family":"Kwiat","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory, Rome, NY, USA"}]}],"member":"2432","reference":[{"key":"ijsse.2013100102-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.06.003"},{"key":"ijsse.2013100102-1","author":"T. H.Cormen","year":"2001","journal-title":"Introduction to algorithms"},{"key":"ijsse.2013100102-2","doi-asserted-by":"publisher","DOI":"10.1109\/32.21731"},{"key":"ijsse.2013100102-3","doi-asserted-by":"crossref","unstructured":"Dominguez-Garcia, A. D., & Grainger, P. T. K. (2008). A framework for multi-level reliability evaluation of electrical energy systems. In Proceedings of the IEEE Energy 2030 Conference.","DOI":"10.1109\/ENERGY.2008.4781072"},{"key":"ijsse.2013100102-4","author":"S. I.Gass","year":"1984","journal-title":"Linear programming: Methods and applications"},{"key":"ijsse.2013100102-5","unstructured":"Hardekopf, B., Kwiat, K., & Upadhyaya, S. (2001). A decentralized voting algorithm for increasing dependability in distributed systems. In Proceedings of the World Multiconference on Systemic, Cybernetics and Informatics."},{"key":"ijsse.2013100102-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.02.013"},{"key":"ijsse.2013100102-7","volume":"Vol. 1","author":"H. W.Kuhn","year":"1950","journal-title":"Contributions to the theory of game"},{"key":"ijsse.2013100102-8","doi-asserted-by":"crossref","unstructured":"Kwiat, K., Taylor, A., Zwicker, W., Hill, D., Wetzonis, S., & Ren, S. (2010). Analysis of binary voting algorithms for use in fault-tolerant and secure computing. In Proceedings of the International Conference on the Computer Engineering and Systems (ICCES).","DOI":"10.1109\/ICCES.2010.5674867"},{"key":"ijsse.2013100102-9","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.832819"},{"key":"ijsse.2013100102-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.10.007"},{"key":"ijsse.2013100102-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.11.060"},{"key":"ijsse.2013100102-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2008.06.006"},{"key":"ijsse.2013100102-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.05.011"},{"key":"ijsse.2013100102-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2008.08.006"},{"key":"ijsse.2013100102-15","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2008.2011661"},{"key":"ijsse.2013100102-16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_5"},{"key":"ijsse.2013100102-17","doi-asserted-by":"publisher","DOI":"10.1007\/BF01448847"},{"key":"ijsse.2013100102-18","doi-asserted-by":"crossref","unstructured":"Raghavan, T. E. S. (1994). Zero-sum two-person games. Handbook of game theory with economic applications.","DOI":"10.1016\/S1574-0005(05)80052-9"},{"key":"ijsse.2013100102-19","doi-asserted-by":"crossref","unstructured":"Siewiorek, D. P., & Swarz, R. S. (1998). Reliable computer systems (3rd ed.): Design and evaluation. Natick, MA: A. K. Peters, Ltd.","DOI":"10.1201\/9781439863961"},{"key":"ijsse.2013100102-20","doi-asserted-by":"publisher","DOI":"10.1145\/320071.320076"},{"key":"ijsse.2013100102-21","doi-asserted-by":"publisher","DOI":"10.1109\/12.88491"},{"key":"ijsse.2013100102-22","unstructured":"Trivedi, K. S. (2002). Probability and statistics with reliability, queuing and computer science applications (2nd edition ed.). Chichester, UK: John Wiley and Sons Ltd."},{"key":"ijsse.2013100102-23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5662-3"},{"key":"ijsse.2013100102-24","unstructured":"Vicki, M., & Bier, V. A. (2002). Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. Engineering Foundation Conference on Risk-Based Decision making in Water Resources X."},{"key":"ijsse.2013100102-25","doi-asserted-by":"crossref","unstructured":"Wang, L., Leiferman, Y., Ren, S., Kwiat, K., & Li, X. (2010). Improving complex distributed software system availability through information hiding. In Proceedings of the ACM Symposium on Applied Computing.","DOI":"10.1145\/1774088.1774183"},{"key":"ijsse.2013100102-26","unstructured":"Wang, L., Ren, S., Yue, K., & Kwiat, K. (2010). Optimal resource allocation to improve distributed system reliability. In Proceedings of the Workshop on Secure Knowledge Management."},{"key":"ijsse.2013100102-27","doi-asserted-by":"crossref","unstructured":"Wang, L., Ren, S., Yue, K., & Kwiat, K. (2011, March). Optimal resource allocation for protecting system availability against random cyber attacks. In Proceedings of the International Conference on Computer Research and Development.","DOI":"10.1109\/ICCRD.2011.5764062"},{"key":"ijsse.2013100102-28","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2005.847270"},{"key":"ijsse.2013100102-29","author":"P.Zafra","year":"2011","journal-title":"Linear programming and two-person zero-sum games"}],"container-title":["International Journal of Secure Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=101891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T08:47:11Z","timestamp":1542703631000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijsse.2013100102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijsse.2013100102","relation":{},"ISSN":["1947-3036","1947-3044"],"issn-type":[{"value":"1947-3036","type":"print"},{"value":"1947-3044","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10]]}}}