Security through redundant data diversity | IEEE Conference Publication | IEEE Xplore