“…The Diversity technique provides equivalent functions with different implementations (e.g., operating systems, variant inputs and interpreters, variant software stack components) [19], [20], [21], [22], [23], [24], [25], [26]. The Redundancy technique provides multiple replicas of the network components (e.g., services, nodes, or paths) to make multiples of the same function [27], [28], [29], [30], [31], [32]. Further, these techniques may be applied in combinations to enhance the security.…”