{"id":"https://openalex.org/W2213746890","doi":"https://doi.org/10.1109/milcom.2015.7357618","title":"Modeling fault tolerant architectures with design diversity for secure systems","display_name":"Modeling fault tolerant architectures with design diversity for secure systems","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2213746890","doi":"https://doi.org/10.1109/milcom.2015.7357618","mag":"2213746890"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2015.7357618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100702010","display_name":"Manuel Rodr\u00edguez","orcid":"https://orcid.org/0009-0003-3690-9849"},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]},{"id":"https://openalex.org/I4388482673","display_name":"U.S. Air Force Research Laboratory Information Directorate","ror":"https://ror.org/00z65zs77","country_code":null,"type":"government","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4388482673","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Manuel Rodriguez","raw_affiliation_strings":["Cyber Assurance Branch, Air Force Research Laboratory Information Directorate, Rome, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Assurance Branch, Air Force Research Laboratory Information Directorate, Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376","https://openalex.org/I4388482673"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113694449","display_name":"Kevin A. Kwiat","orcid":null},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]},{"id":"https://openalex.org/I4388482673","display_name":"U.S. Air Force Research Laboratory Information Directorate","ror":"https://ror.org/00z65zs77","country_code":null,"type":"government","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4388482673","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin A. Kwiat","raw_affiliation_strings":["Cyber Assurance Branch, Air Force Research Laboratory Information Directorate, Rome, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Assurance Branch, Air Force Research Laboratory Information Directorate, Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376","https://openalex.org/I4388482673"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108620592","display_name":"Charles Kamhoua","orcid":null},"institutions":[{"id":"https://openalex.org/I4388482673","display_name":"U.S. Air Force Research Laboratory Information Directorate","ror":"https://ror.org/00z65zs77","country_code":null,"type":"government","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4388482673","https://openalex.org/I4389425425"]},{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles A. Kamhoua","raw_affiliation_strings":["Cyber Assurance Branch, Air Force Research Laboratory Information Directorate, Rome, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Assurance Branch, Air Force Research Laboratory Information Directorate, Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376","https://openalex.org/I4388482673"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100702010"],"corresponding_institution_ids":["https://openalex.org/I1280414376","https://openalex.org/I4388482673"],"apc_list":null,"apc_paid":null,"fwci":0.3232,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.61230187,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1254","last_page":"1263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7272838950157166},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.6676865816116333},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.5823425650596619},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.5817728042602539},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5197265148162842},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.46237608790397644},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4469515383243561},{"id":"https://openalex.org/keywords/diversity","display_name":"Diversity (politics)","score":0.4184534549713135},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4183446168899536},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.18903055787086487},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1544443666934967},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09208720922470093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7272838950157166},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.6676865816116333},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.5823425650596619},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.5817728042602539},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5197265148162842},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46237608790397644},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4469515383243561},{"id":"https://openalex.org/C2781316041","wikidata":"https://www.wikidata.org/wiki/Q1230584","display_name":"Diversity (politics)","level":2,"score":0.4184534549713135},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4183446168899536},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.18903055787086487},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1544443666934967},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09208720922470093},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2015.7357618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1523087909","https://openalex.org/W1545927878","https://openalex.org/W1714865987","https://openalex.org/W1905756341","https://openalex.org/W1964882586","https://openalex.org/W1972976939","https://openalex.org/W1979868167","https://openalex.org/W1984960541","https://openalex.org/W2012032225","https://openalex.org/W2030446403","https://openalex.org/W2097719961","https://openalex.org/W2106182318","https://openalex.org/W2108860402","https://openalex.org/W2111817346","https://openalex.org/W2121263037","https://openalex.org/W2129360963","https://openalex.org/W2131529479","https://openalex.org/W2133201251","https://openalex.org/W2154559298","https://openalex.org/W2161075640","https://openalex.org/W2162970162","https://openalex.org/W2312852230","https://openalex.org/W2908753732","https://openalex.org/W3035757797","https://openalex.org/W6676006331","https://openalex.org/W6677913204"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2109735838","https://openalex.org/W186595886","https://openalex.org/W1580635292","https://openalex.org/W4236447107","https://openalex.org/W2169208394","https://openalex.org/W3147872107"],"abstract_inverted_index":{"Modern":[0],"critical":[1,110],"systems":[2,34,69,111,131],"are":[3,71,142,165,181],"facing":[4],"an":[5],"increasingly":[6],"number":[7,162,198],"of":[8,16,28,33,42,55,62,97,109,125,137,154,163,176,199],"new":[9],"security":[10,117],"risks.":[11],"Nowadays,":[12],"the":[13,24,29,37,40,47,52,58,74,105,135,186,193,197,205],"extensive":[14],"use":[15,136],"third-party":[17],"components":[18],"and":[19,23,31,77,92,99,107,122,171,189,201,204],"tools":[20],"during":[21],"design,":[22],"massive":[25],"outsourcing":[26],"overseas":[27],"implementation":[30],"integration":[32],"parts,":[35],"augment":[36],"chances":[38],"for":[39,83,129,158],"introduction":[41],"malicious":[43],"system":[44],"alterations":[45],"along":[46],"development":[48,106],"lifecycle.":[49],"In":[50],"addition,":[51],"growing":[53],"dominance":[54],"monocultures":[56],"in":[57],"cyberspace,":[59],"comprising":[60],"collections":[61],"identical":[63],"interconnected":[64],"computer":[65],"platforms,":[66],"leads":[67],"to":[68,73,104,147,151,167,185],"that":[70,132],"subject":[72],"same":[75],"vulnerabilities":[76],"attacks.":[78],"This":[79,119],"is":[80],"especially":[81],"important":[82],"cyber-physical":[84],"systems,":[85],"which":[86],"interconnect":[87],"cyberspace":[88],"with":[89,183],"computing":[90],"resources":[91],"physical":[93],"processes.":[94],"The":[95,140,179],"application":[96],"concepts":[98],"principles":[100],"from":[101],"design":[102,138,177,187],"diversity":[103],"operation":[108],"can":[112],"help":[113],"palliate":[114],"these":[115],"emerging":[116],"challenges.":[118],"paper":[120],"defines":[121],"analyzes":[123],"models":[124,141],"fault":[126,169],"tolerant":[127],"architectures":[128,149,180],"secure":[130,159],"rely":[133],"on":[134,192],"diversity.":[139,178],"built":[143],"using":[144],"minimal":[145],"extensions":[146],"classical":[148],"according":[150],"a":[152,174],"set":[153],"defined":[155],"failure":[156,195],"classes":[157],"services.":[160],"A":[161],"metrics":[164],"provided":[166],"quantify":[168],"tolerance":[170],"performance":[172,206],"as":[173],"function":[175],"analyzed":[182],"respect":[184],"diversity,":[188],"compared":[190],"based":[191],"undetected":[194],"probability,":[196],"tolerated":[200],"detected":[202],"failures,":[203],"delay.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
