Figure 4 - uploaded by Julio Hernandez-Castro
Content may be subject to copyright.
OS evolution of Top 500 supercomputers in the World on June 2013, from  

OS evolution of Top 500 supercomputers in the World on June 2013, from  

Source publication
Article
Full-text available
In this work, we briefly introduce and discuss some of the diversity measures used in Ecology. After a succinct description and analysis of the most relevant ones, we single out the Shannon-Weiner index. We justify why it is the most informative and relevant one for measuring software diversity. Then, we show how it can be used for effectively asse...

Context in source publication

Context 1
... the figures shown in Table 3.1, the diversity of this ecosystem is 3.971 esn . This is still too low in comparison with living ecosystems, and a clear demonstration of the poor diversity of this market. Of course, the real figures will lay somewhere in between these two values of 1.386 and 3.971 esn , possibly much closer to the lower due to millions of common lines of code between many of the OS that we treat here as different. In any case, these figures reveal that added diversity is much needed in this ecosystem for increased security. A much more surprising finding in the course of our research is that the Desktop Operating System market is not the only with a worryingly low diversity, and that it is not even the worst offender. The values shown in figure 4 lead to a shocking diversity measure of 1.269 esn , even worse that the one for the Desktop PC operating ...

Similar publications

Conference Paper
Full-text available
With the tremendous growth of published news articles, a key issue is how to help users find diverse and interesting news stories. To this end, it is crucial to understand and build accurate profiles for both users and news articles. In this paper, we define a user profile based on (1) the set of entities she/he talked about it in her/his comments...
Article
Full-text available
The propagation techniques and the payload of Duqu have been closely studied over the past year and it has been said that Duqu shared functionalities with Stuxnet. We focused on the driver used by Duqu during the infection, our contribution consists in reverse-engineering the driver: we rebuilt its source code and analyzed the mechanisms it uses to...

Citations

Chapter
Suppose you assessed or analyzed the resilience of a system using approaches described in Part II of this book or similar approaches. Chances are, you determined that the resilience of the system is inadequate, at least in part. What should you do to improve it? This is the theme of Part III of this book: methods, techniques, and approaches to enhancing cyber resilience of a system, either via an appropriate initial design or by adding mitigation measures or by defensive actions during a cyberattack.