Investigating survivability of configuration management tools in unreliable and hostile networks | IEEE Conference Publication | IEEE Xplore