Towards a theory of autonomous reconstitution of compromised cyber-systems | IEEE Conference Publication | IEEE Xplore