default search action
Slim Rekhis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Slim Abbes, Slim Rekhis:
Reinforcement Learning for Intelligent Sensor Virtualization and Provisioning in Internet of Vehicles (IoV). IEEE Access 12: 54352-54370 (2024) - 2022
- [c54]Slim Abbes, Slim Rekhis:
Sensor Virtualization and Provision in Internet of Vehicles. AINA (2) 2022: 386-397 - [c53]Amal Sayari, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, Belhassen Jerbi:
Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph. AINA (2) 2022: 560-572 - [c52]Slim Abbes, Slim Rekhis:
Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV). NCA 2022: 217-224 - 2021
- [j14]Basem Shihada, Tamer A. ElBatt, Ahmed M. Eltawil, Mohammad Mansour, Essaid Sabir, Slim Rekhis, Sanaa Sharafeddine:
Networking research for the Arab world: from regional initiatives to potential global impact. Commun. ACM 64(4): 114-119 (2021) - [j13]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
Proactive Security for Safety and Sustainability of Mission Critical Systems. IEEE Trans. Sustain. Comput. 6(2): 257-273 (2021) - [c51]Slim Abbes, Slim Rekhis:
A Blockchain-based Solution for Reputation Management in IoV. IWCMC 2021: 1129-1134 - [c50]Lamia Chaari Fourati, Slim Rekhis, Samiha Ayed, Mohamed Jmaiel:
Connected Medical Kiosks to Counter COVID-19: Needs, Architecture & Design Guidelines. IWCMC 2021: 2032-2037 - [c49]Yosra Lakhdhar, Slim Rekhis:
Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial Tactics. SP (Workshops) 2021: 309-317 - 2020
- [c48]Soumaya Bel Hadj Youssef, Noureddine Boudriga, Slim Rekhis:
A trust-aware micropayment system for data muling in cloud environment: a Blockchain based approach. COMNET 2020: 1-8 - [c47]Yosra Lakhdhar, Slim Rekhis:
Active, Reactive and Proactive Visibility-Based Cyber Defense For Defending Against Attacks On Critical Systems. IWCMC 2020: 439-444 - [c46]Yosra Lakhdhar, Slim Rekhis, Essaid Sabir:
A Game Theoretic Approach For Deploying Forensic Ready Systems. SoftCOM 2020: 1-6
2010 – 2019
- 2019
- [j12]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios. J. Univers. Comput. Sci. 25(9): 1066-1088 (2019) - [c45]Mohamed Jacem Guezguez, Slim Rekhis:
Scalable and Secure Mobile Sensor Cloud Architecture for the Delivery of Surveillance Applications As A Service. MoMM 2019: 56-65 - [c44]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga:
A Blockchain based Secure IoT Solution for the Dam Surveillance. WCNC 2019: 1-6 - [i1]Emmanuel Tuyishimire, Antoine B. Bagula, Slim Rekhis, Noureddine Boudriga:
Real-time data muling using a team of heterogeneous unmanned aerial vehicles. CoRR abs/1912.08846 (2019) - 2018
- [j11]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, Mohamed Allouche:
Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform. J. Netw. Comput. Appl. 107: 1-21 (2018) - [c43]Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga:
Game-Based Data Muling as a Service in Infrastructureless Area. ADHOC-NOW 2018: 280-292 - [c42]Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Cloud-Based Global Monitoring System for Smart Cities. AINA Workshops 2018: 307-312 - [c41]Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Secure Authentication Solution for Cloud-based Smart City Surveillance System. ICETE (2) 2018: 668-673 - [c40]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
A Context-Based Model for Validating the Ability of Cyber Systems to Defend Against Attacks. UNet 2018: 295-307 - [e2]Noureddine Boudriga, Mohamed-Slim Alouini, Slim Rekhis, Essaid Sabir, Sofie Pollin:
Ubiquitous Networking - 4th International Symposium, UNet 2018, Hammamet, Tunisia, May 2-5, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11277, Springer 2018, ISBN 978-3-030-02848-0 [contents] - 2017
- [j10]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, Mohamed Allouche:
Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios. Digit. Investig. 21: 11-30 (2017) - [c39]Emmanuel Tuyishimire, Antoine B. Bagula, Slim Rekhis, Noureddine Boudriga:
Cooperative data muling from ground sensors to base stations using UAVs. ISCC 2017: 35-41 - [c38]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
Proactive Damage Assessment of Cyber Attacks Using Mobile Observer Agents. MoMM 2017: 29-38 - [c37]Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga:
Observation-based detection of femtocell attacks in wireless mobile networks. SAC 2017: 529-534 - [c36]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga:
A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development. UNet 2017: 141-153 - 2016
- [c35]Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention. MoMM 2016: 45-49 - [c34]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
An Approach To A Graph-Based Active Cyber Defense Model. MoMM 2016: 261-268 - [c33]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga, Antoine B. Bagula:
A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs. MoMM 2016: 317-326 - [c32]Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga:
A sensor cloud architecture for healthcare applications. SAC 2016: 612-617 - [c31]Antoine B. Bagula, Emmanuel Tuyishimire, Jason Wadepoel, Noureddine Boudriga, Slim Rekhis:
Internet-of-Things in Motion: A Cooperative Data Muling Model for Public Safety. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 17-24 - [c30]Emmanuel Tuyishimire, Ismail Adiel, Slim Rekhis, Antoine B. Bagula, Noureddine Boudriga:
Internet of Things in Motion: A Cooperative Data Muling Model Under Revisit Constraints. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 1123-1130 - [c29]Mouna Garai, Slim Rekhis, Noureddine Boudriga:
A Vehicular Cloud for Secure and QoS Aware Service Provision. UNet 2016: 219-233 - 2015
- [c28]Mouna Garai, Slim Rekhis, Noureddine Boudriga:
Communication as a service for cloud VANETs. ISCC 2015: 371-377 - [c27]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga:
Design and analysis of a WBAN-based system for firefighters. IWCMC 2015: 526-531 - [c26]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga:
Energy harvesting based protection of border surveillance systems. SAC 2015: 621-626 - [c25]Sarra Berrahal, Jong-Hoon Kim, Slim Rekhis, Noureddine Boudriga, Deon Wilkins, Jaime Acevedo:
Unmanned aircraft vehicle assisted WSN-based border surveillance. SoftCOM 2015: 132-137 - 2014
- [j9]Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga:
Security of implantable medical devices: limits, requirements, and proposals. Secur. Commun. Networks 7(12): 2475-2491 (2014) - [c24]Mouna Garai, Mariem Mahjoub, Slim Rekhis, Noureddine Boudriga, Mohamed Bettaz:
Access and Resources Reservation in 4G-VANETs for Multimedia Applications. ADHOC-NOW Workshops 2014: 95-108 - [c23]Slim Rekhis:
Security investigation in wireless networks (invited talk). SFCS@ASIACCS 2014: 1-2 - [c22]Nourhene Ellouze, Slim Rekhis, Mohamed Allouche, Noureddine Boudriga:
Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices. AIDP 2014: 15-30 - [e1]Noureddine Boudriga, Slim Rekhis:
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, SFCS 2014, Kyoto, Japan, June 3, 2014. ACM 2014, ISBN 978-1-4503-2802-9 [contents] - 2013
- [c21]Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga:
Securing implantable cardiac medical devices: use of radio frequency energy harvesting. TrustED@CCS 2013: 35-42 - [c20]Bayrem Triki, Slim Rekhis, M'hamed Chammem, Noureddine Boudriga:
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks. WMNC 2013: 1-8 - 2012
- [j8]Slim Rekhis, Noureddine Boudriga:
A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks. Comput. Secur. 31(8): 967-982 (2012) - [j7]Slim Rekhis, Noureddine Boudriga:
A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks. IEEE Trans. Inf. Forensics Secur. 7(2): 635-650 (2012) - [c19]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
A mark association-based investigation of attack scenarios in communication networks. ICC 2012: 6673-6677 - [c18]Slim Rekhis, Nourhene Ellouze, Noureddine Boudriga:
A wireless sensor network based water monitoring system. Q2SWinet 2012: 33-40 - 2011
- [j6]Slim Rekhis, Noureddine Boudriga:
Logic-based approach for digital forensic investigation in communication Networks. Comput. Secur. 30(6-7): 376-396 (2011) - [j5]Slim Rekhis, Noureddine Boudriga:
Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks. EURASIP J. Wirel. Commun. Netw. 2011: 39 (2011) - [c17]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks. IWCMC 2011: 695-700 - [c16]Slim Rekhis, Baha Bennour, Noureddine Boudriga:
Validation of Security Solutions for Communication Networks: A Policy-Based Approach. NCA 2011: 115-122 - 2010
- [c15]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
A Novel Secure and Multipath Routing Algorithm in Wireless Sensor Networks. DCNET/OPTICS 2010: 25-34 - [c14]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks. ICETE (Selected Papers) 2010: 54-70 - [c13]Slim Rekhis, Noureddine Boudriga:
Formal Digital Investigation of Anti-forensic Attacks. SADFE 2010: 33-44
2000 – 2009
- 2009
- [j4]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
Forensic Investigation in Communication Networks Using Incomplete Digital Evidences. Int. J. Commun. Netw. Syst. Sci. 2(9): 857-873 (2009) - [j3]Slim Rekhis, Noureddine Boudriga:
Visibility: a novel concept for characterising provable network digital evidences. Int. J. Secur. Networks 4(4): 234-245 (2009) - [j2]Slim Rekhis, Noureddine Boudriga:
Investigating Attack Scenarios in Multihop Wireless Systems. J. Networks 4(7): 539-551 (2009) - [c12]Alaaedine Chouchane, Slim Rekhis, Noureddine Boudriga:
Defending against rogue base station attacks using wavelet based fingerprinting. AICCSA 2009: 523-530 - [c11]Slim Rekhis, Noureddine Boudriga:
Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. ICUMT 2009: 1-8 - [c10]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. NCA 2009: 179-186 - [c9]Slim Rekhis, Noureddine Boudriga:
A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks. SADFE 2009: 62-72 - 2008
- [j1]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Intrusion detection and tolerance: A global scheme. Int. J. Commun. Syst. 21(2): 211-230 (2008) - [c8]Slim Rekhis, Noureddine Boudriga:
Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems. NTMS 2008: 1-4 - [c7]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
Cognitive-Maps Based Investigation of Digital Security Incidents. SADFE 2008: 25-40 - [c6]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
DigForNet: Digital Forensic in Networking. SEC 2008: 637-651 - 2006
- [c5]Slim Rekhis, Noureddine Boudriga:
Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation. GLOBECOM 2006 - 2005
- [c4]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Cooperative Intrusion Detection and Tolerance System. ICECS 2005: 1-4 - [c3]Faouzi Zarai, Slim Rekhis, Noureddine Boudriga, Kamel Zidane:
SDPPM: An IP traceback scheme for MANET. ICECS 2005: 1-4 - [c2]Slim Rekhis, Noureddine Boudriga:
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. MMM-ACNS 2005: 325-338 - [c1]Slim Rekhis, Noureddine Boudriga:
A formal logic-based language and an automated verification tool for computer forensic investigation. SAC 2005: 287-291
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-06 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint