Resilient Computing: when Dependability meets Cyber security