. Fig, 5. The error non detection rates of different error detection policies REFERENCES

A. Youssef, Y. Crouzet, A. De-bonneval, J. Arlat, J. J. Aubert et al., Communication Integrity in Networks for Critical Control Systems, 2006 Sixth European Dependable Computing Conference, pp.23-34, 2006.
DOI : 10.1109/EDCC.2006.5

M. Paulitsch, J. Morris, B. Hall, K. Driscoll, E. Latronico et al., Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems, 2005 International Conference on Dependable Systems and Networks (DSN'05), pp.346-355, 2001.
DOI : 10.1109/DSN.2005.31

. Ph, T. Koopman, and . Chakravarty, Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks, The international Conference on Dependable Systems and Networks (DSN), pp.145-154, 2004.

L. J. Saiz-adalid, P. J. Gil-vicente, J. C. Ruiz-garcia, D. Gil-tomas, J. C. Baraza et al., Flexible Unequal Error Control Codes with Selectable Error Detection and Correction Levels, The International Conference on Computer Safety, Reliability and Security (Safecomp), pp.24-27, 2013.
DOI : 10.1007/978-3-642-40793-2_17

M. Paulitsch and B. Hall, Insights into the Sensitivity of the BRAIN (Braided Ring Availability Integrity Network)--On Platform Robustness in Extended Operation, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), 2007.
DOI : 10.1109/DSN.2007.60

P. E. Ammann and J. C. Knight, Data diversity: an approach to software fault tolerance, IEEE Transactions on Computers, vol.37, issue.4, pp.418-425, 1988.
DOI : 10.1109/12.2185

T. Maxino and P. , Koopman The effectiveness of checksums for embedded control networks, IEEE Transactions on dependable and secure computing, vol.6, issue.1, 2009.

A. Nakassis, Fletcher's error detection algorithm: how to implement it efficiently and how toavoid the most common pitfalls, ACM SIGCOMM Computer Communication Review, vol.18, issue.5, pp.63-88, 1988.
DOI : 10.1145/53644.53648