Figure 5From: Replica placement to mitigate attacks on clouds Evaluation of the rounds the attacker needs until it probabilistically gets the majority as a function of the number of physical machines. Back to article page