Follow
Slim Rekhis
Title
Cited by
Cited by
Year
Border surveillance monitoring using quadcopter UAV-aided wireless sensor networks
S Berrahal, JH Kim, S Rekhis, N Boudriga, D Wilkins, J Acevedo
Journal of Communications Software and Systems 12 (1), 67-82, 2016
662016
A system for formal digital forensic investigation aware of anti-forensic attacks
S Rekhis, N Boudriga
IEEE transactions on information forensics and security 7 (2), 635-650, 2011
612011
Cooperative data muling from ground sensors to base stations using UAVs
E Tuyishimire, A Bagula, S Rekhis, N Boudriga
2017 IEEE Symposium on Computers and Communications (ISCC), 35-41, 2017
572017
Digital investigation of wormhole attacks in wireless sensor networks
B Triki, S Rekhis, N Boudriga
2009 Eighth IEEE International Symposium on Network Computing and …, 2009
332009
A blockchain based secure IoT solution for the dam surveillance
SBH Youssef, S Rekhis, N Boudriga
2019 IEEE wireless communications and networking conference (WCNC), 1-6, 2019
302019
Internet-of-things in motion: A cooperative data muling model for public safety
A Bagula, E Tuyishimire, J Wadepoel, N Boudriga, S Rekhis
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
302016
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks
B Triki, S Rekhis, M Chammem, N Boudriga
6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-8, 2013
272013
Security of implantable medical devices: Limits, requirements, and proposals
N Ellouze, M Allouche, HB Ahmed, S Rekhis, N Boudriga
Security and Communication Networks 7 (12), 2475-2491, 2014
262014
Formal digital investigation of anti-forensic attacks
S Rekhis, N Boudriga
2010 Fifth IEEE International Workshop on Systematic Approaches to Digital …, 2010
242010
Communication as a service for cloud VANETs
M Garai, S Rekhis, N Boudriga
2015 IEEE Symposium on Computers and Communication (ISCC), 371-377, 2015
232015
Visibility: a novel concept for characterising provable network digital evidences
S Rekhis, NA Boudriga
International journal of security and networks 4 (4), 234-245, 2009
232009
Intrusion detection and tolerance: A global scheme
Y Djemaiel, S Rekhis, N Boudriga
International Journal of Communication Systems 21 (2), 211-230, 2008
232008
A temporal logic-based model for forensic investigation in networked system security
S Rekhis, N Boudriga
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
232005
Internet of things in motion: A cooperative data muling model under revisit constraints
E Tuyishimire, I Adiel, S Rekhis, BA Bagula, N Boudriga
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
222016
Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform
N Ellouze, S Rekhis, N Boudriga, M Allouche
Journal of Network and Computer Applications 107, 1-21, 2018
212018
Unmanned aircraft vehicle assisted WSN-based border surveillance
S Berrahal, JH Kim, S Rekhis, N Boudriga, D Wilkins, J Acevedo
2015 23rd International Conference on Software, Telecommunications and …, 2015
212015
Logic-based approach for digital forensic investigation in communication networks
S Rekhis, N Boudriga
Computers & Security 30 (6-7), 376-396, 2011
192011
A formal logic-based language and an automated verification tool for computer forensic investigation
S Rekhis, N Boudriga
Proceedings of the 2005 ACM symposium on Applied computing, 287-291, 2005
182005
Cardiac implantable medical devices forensics: Postmortem analysis of lethal attacks scenarios
N Ellouze, S Rekhis, N Boudriga, M Allouche
Digital Investigation 21, 11-30, 2017
162017
A novel secure and multipath routing algorithm in wireless sensor networks
B Triki, S Rekhis, N Boudriga
2010 International Conference on Data Communication Networking (DCNET), 1-10, 2010
162010
The system can't perform the operation now. Try again later.
Articles 1–20