Slim Rekhis
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j11]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, Mohamed Allouche:
Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform. J. Network and Computer Applications 107: 1-21 (2018) - 2017
- [j10]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, Mohamed Allouche:
Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios. Digital Investigation 21: 11-30 (2017) - [c38]Emmanuel Tuyishimire, Antoine B. Bagula, Slim Rekhis, Noureddine Boudriga:
Cooperative data muling from ground sensors to base stations using UAVs. ISCC 2017: 35-41 - [c37]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
Proactive Damage Assessment of Cyber Attacks Using Mobile Observer Agents. MoMM 2017: 29-38 - [c36]Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga:
Observation-based detection of femtocell attacks in wireless mobile networks. SAC 2017: 529-534 - [c35]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga:
A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development. UNet 2017: 141-153 - 2016
- [c34]Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention. MoMM 2016: 45-49 - [c33]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
An Approach To A Graph-Based Active Cyber Defense Model. MoMM 2016: 261-268 - [c32]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga, Antoine B. Bagula:
A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs. MoMM 2016: 317-326 - [c31]Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga:
A sensor cloud architecture for healthcare applications. SAC 2016: 612-617 - [c30]Antoine B. Bagula, Emmanuel Tuyishimire, Jason Wadepoel, Noureddine Boudriga, Slim Rekhis:
Internet-of-Things in Motion: A Cooperative Data Muling Model for Public Safety. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 17-24 - [c29]Emmanuel Tuyishimire, Ismail Adiel, Slim Rekhis, Antoine B. Bagula, Noureddine Boudriga:
Internet of Things in Motion: A Cooperative Data Muling Model Under Revisit Constraints. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 1123-1130 - [c28]Mouna Garai, Slim Rekhis, Noureddine Boudriga:
A Vehicular Cloud for Secure and QoS Aware Service Provision. UNet 2016: 219-233 - 2015
- [c27]Mouna Garai, Slim Rekhis, Noureddine Boudriga:
Communication as a service for cloud VANETs. ISCC 2015: 371-377 - [c26]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga:
Design and analysis of a WBAN-based system for firefighters. IWCMC 2015: 526-531 - [c25]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga:
Energy harvesting based protection of border surveillance systems. SAC 2015: 621-626 - [c24]Sarra Berrahal, Jong-Hoon Kim, Slim Rekhis, Noureddine Boudriga, Deon Wilkins, Jaime Acevedo:
Unmanned aircraft vehicle assisted WSN-based border surveillance. SoftCOM 2015: 132-137 - 2014
- [j9]Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga:
Security of implantable medical devices: limits, requirements, and proposals. Security and Communication Networks 7(12): 2475-2491 (2014) - [c23]Mouna Garai, Mariem Mahjoub, Slim Rekhis, Noureddine Boudriga, Mohamed Bettaz:
Access and Resources Reservation in 4G-VANETs for Multimedia Applications. ADHOC-NOW Workshops 2014: 95-108 - [c22]
- [c21]Nourhene Ellouze, Slim Rekhis, Mohamed Allouche, Noureddine Boudriga:
Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices. AIDP 2014: 15-30 - [e1]Noureddine Boudriga, Slim Rekhis:
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, SFCS 2014, Kyoto, Japan, June 3, 2014. ACM 2014, ISBN 978-1-4503-2802-9 [contents] - 2013
- [c20]Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga:
Securing implantable cardiac medical devices: use of radio frequency energy harvesting. TrustED@CCS 2013: 35-42 - [c19]Bayrem Triki, Slim Rekhis, M'hamed Chammem, Noureddine Boudriga:
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks. WMNC 2013: 1-8 - 2012
- [j8]Slim Rekhis, Noureddine Boudriga:
A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks. Computers & Security 31(8): 967-982 (2012) - [j7]Slim Rekhis, Noureddine Boudriga:
A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks. IEEE Trans. Information Forensics and Security 7(2): 635-650 (2012) - [c18]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
A mark association-based investigation of attack scenarios in communication networks. ICC 2012: 6673-6677 - [c17]Slim Rekhis, Nourhene Ellouze, Noureddine Boudriga:
A wireless sensor network based water monitoring system. Q2SWinet 2012: 33-40 - 2011
- [j6]Slim Rekhis, Noureddine Boudriga:
Logic-based approach for digital forensic investigation in communication Networks. Computers & Security 30(6-7): 376-396 (2011) - [j5]Slim Rekhis, Noureddine Boudriga:
Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks. EURASIP J. Wireless Comm. and Networking 2011: 39 (2011) - [c16]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks. IWCMC 2011: 695-700 - [c15]Slim Rekhis, Baha Bennour, Noureddine Boudriga:
Validation of Security Solutions for Communication Networks: A Policy-Based Approach. NCA 2011: 115-122 - 2010
- [c14]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
A Novel Secure and Multipath Routing Algorithm in Wireless Sensor Networks. DCNET/OPTICS 2010: 25-34 - [c13]Slim Rekhis, Noureddine Boudriga:
Formal Digital Investigation of Anti-forensic Attacks. SADFE 2010: 33-44
2000 – 2009
- 2009
- [j4]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
Forensic Investigation in Communication Networks Using Incomplete Digital Evidences. IJCNS 2(9): 857-873 (2009) - [j3]Slim Rekhis, Noureddine Boudriga:
Visibility: a novel concept for characterising provable network digital evidences. IJSN 4(4): 234-245 (2009) - [j2]Slim Rekhis, Noureddine Boudriga:
Investigating Attack Scenarios in Multihop Wireless Systems. JNW 4(7): 539-551 (2009) - [c12]Alaaedine Chouchane, Slim Rekhis, Noureddine Boudriga:
Defending against rogue base station attacks using wavelet based fingerprinting. AICCSA 2009: 523-530 - [c11]Slim Rekhis, Noureddine Boudriga:
Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. ICUMT 2009: 1-8 - [c10]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. NCA 2009: 179-186 - [c9]Slim Rekhis, Noureddine Boudriga:
A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks. SADFE 2009: 62-72 - 2008
- [j1]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Intrusion detection and tolerance: A global scheme. Int. J. Communication Systems 21(2): 211-230 (2008) - [c8]Slim Rekhis, Noureddine Boudriga:
Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems. NTMS 2008: 1-4 - [c7]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
Cognitive-Maps Based Investigation of Digital Security Incidents. SADFE 2008: 25-40 - [c6]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
DigForNet: Digital Forensic in Networking. SEC 2008: 637-651 - 2006
- [c5]Slim Rekhis, Noureddine Boudriga:
Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation. GLOBECOM 2006 - 2005
- [c4]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Cooperative Intrusion Detection and Tolerance System. ICECS 2005: 1-4 - [c3]Faouzi Zarai, Slim Rekhis, Noureddine Boudriga, K. Zidane:
SDPPM: An IP traceback scheme for MANET. ICECS 2005: 1-4 - [c2]Slim Rekhis, Noureddine Boudriga:
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. MMM-ACNS 2005: 325-338 - [c1]Slim Rekhis, Noureddine Boudriga:
A formal logic-based language and an automated verification tool for computer forensic investigation. SAC 2005: 287-291
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-04-26 16:09 CEST by the dblp team