Sanaz Rahimi

  • Citations Per Year
Learn More
Predicting software vulnerability discovery trends can help improve secure deployment of software applications and facilitate backup provisioning, disaster recovery, diversity planning, and maintenance scheduling. Vulnerability discovery models (VDMs) have been studied in the literature as a means to capture the underlying stochastic process. Based on the(More)
*Corresponding Author: E-mail: Dr.aghdam@gmail.com 1 Assistant professor of orthopedic surgery, Department of Orthopedic surgery, Tabriz University of Medical Sciences 2 *Young Researchers club, Tabriz Branch, Islamic Azad University, Tabriz, Iran 3 Member of Scientific Association of Medical Faculty, Islamic Azad University, Tabriz branch, Iran 4 Assistant(More)
Virtualization is increasingly being used as a component in designing secure cyber architectures. The proposed applications include strong isolation, monitoring, fault tolerance, execution replay, etc. However, there are various virtualization approaches which differ in their security implications, proper applications, overheads, requirements, and most(More)
Virtual private networks (VPNs) are widely recommended to protect otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many deployments. This paper uses a probabilistic model to(More)
Mobile agent technology is one of the fastest growing areas of research for application development on the Internet today. The potential of mobile agents to perform many tasks, from the menial and routine, to the more complex ones has been widely recognized and thus spurred. However, the lack of a fault tolerant infrastructure and methodologies that address(More)
  • 1