A Nguyen-Tuong, D Evans, JC Knight, B Cox… - … Systems and Networks …, 2008 - computer.org
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring
secrets. Instead, they use redundancy (to require an attacker to simultaneously compromise …