Skip to main content
Fig. 9 | Journal of the Brazilian Computer Society

Fig. 9

From: On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions

Fig. 9

State diagrams of sequential rejuvenations with k=0, under optimal sequential attack. Each sub-figure depicts the state diagram of a system with a different number of nodes (n{2,3,4}). In each sub-figure, each circle represents a set of n nodes and their states: healthy (H) or intruded (I). A rejuvenation heals ( or ) the right-upper triangle and then rotates the circle counter-clock-wise by 2π/n (i.e., by 1/n of a full circle rotation). An intrusion intrudes () the healthy triangle further away (in time) being healed

Back to article page