On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions