Sanaz Rahimi

Learn More
Virtual private networks (VPNs) are widely recommended to protect otherwise insecure industrial control protocols. VPNs provide confidentiality , integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many deployments. This paper uses a probabilistic model to(More)
Mobile agent technology is one of the fastest growing areas of research for application development on the Internet today. The potential of mobile agents to perform many tasks, from the menial and routine, to the more complex ones has been widely recognized and thus spurred. However, the lack of a fault tolerant infrastructure and methodologies that address(More)
  • 1