Slim Rekhis

Orcid: 0000-0002-6507-6300

According to our database1, Slim Rekhis authored at least 70 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Reinforcement Learning for Intelligent Sensor Virtualization and Provisioning in Internet of Vehicles (IoV).
IEEE Access, 2024

2022
Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV).
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph.
Proceedings of the Advanced Information Networking and Applications, 2022

Sensor Virtualization and Provision in Internet of Vehicles.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Proactive Security for Safety and Sustainability of Mission Critical Systems.
IEEE Trans. Sustain. Comput., 2021

Networking research for the Arab world: from regional initiatives to potential global impact.
Commun. ACM, 2021

Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial Tactics.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Connected Medical Kiosks to Counter COVID-19: Needs, Architecture & Design Guidelines.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

A Blockchain-based Solution for Reputation Management in IoV.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

2020
A Game Theoretic Approach For Deploying Forensic Ready Systems.
Proceedings of the 28th International Conference on Software, 2020

Active, Reactive and Proactive Visibility-Based Cyber Defense For Defending Against Attacks On Critical Systems.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A trust-aware micropayment system for data muling in cloud environment: a Blockchain based approach.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020

2019
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios.
J. Univers. Comput. Sci., 2019

Real-time data muling using a team of heterogeneous unmanned aerial vehicles.
CoRR, 2019

A Blockchain based Secure IoT Solution for the Dam Surveillance.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Scalable and Secure Mobile Sensor Cloud Architecture for the Delivery of Surveillance Applications As A Service.
Proceedings of the MoMM 2019: The 17th International Conference on Advances in Mobile Computing & Multimedia, 2019

2018
Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform.
J. Netw. Comput. Appl., 2018

A Context-Based Model for Validating the Ability of Cyber Systems to Defend Against Attacks.
Proceedings of the Ubiquitous Networking - 4th International Symposium, 2018

Secure Authentication Solution for Cloud-based Smart City Surveillance System.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Cloud-Based Global Monitoring System for Smart Cities.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Game-Based Data Muling as a Service in Infrastructureless Area.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

2017
Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios.
Digit. Investig., 2017

A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

Observation-based detection of femtocell attacks in wireless mobile networks.
Proceedings of the Symposium on Applied Computing, 2017

Proactive Damage Assessment of Cyber Attacks Using Mobile Observer Agents.
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017

Cooperative data muling from ground sensors to base stations using UAVs.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
A Vehicular Cloud for Secure and QoS Aware Service Provision.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Internet of Things in Motion: A Cooperative Data Muling Model Under Revisit Constraints.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Internet-of-Things in Motion: A Cooperative Data Muling Model for Public Safety.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A sensor cloud architecture for healthcare applications.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

An Approach To A Graph-Based Active Cyber Defense Model.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

2015
Unmanned aircraft vehicle assisted WSN-based border surveillance.
Proceedings of the 23rd International Conference on Software, 2015

Energy harvesting based protection of border surveillance systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Design and analysis of a WBAN-based system for firefighters.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Communication as a service for cloud VANETs.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2014
Security of implantable medical devices: limits, requirements, and proposals.
Secur. Commun. Networks, 2014

Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices.
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014

Security investigation in wireless networks (invited talk).
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

Access and Resources Reservation in 4G-VANETs for Multimedia Applications.
Proceedings of the Ad-hoc Networks and Wireless, 2014

2013
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Securing implantable cardiac medical devices: use of radio frequency energy harvesting.
Proceedings of the TrustED'13, 2013

2012
A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks.
IEEE Trans. Inf. Forensics Secur., 2012

A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks.
Comput. Secur., 2012

A wireless sensor network based water monitoring system.
Proceedings of the Q2SWinet'12, 2012

A mark association-based investigation of attack scenarios in communication networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks.
EURASIP J. Wirel. Commun. Netw., 2011

Logic-based approach for digital forensic investigation in communication Networks.
Comput. Secur., 2011

Validation of Security Solutions for Communication Networks: A Policy-Based Approach.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
Formal Digital Investigation of Anti-forensic Attacks.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

A Novel Secure and Multipath Routing Algorithm in Wireless Sensor Networks.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

2009
Investigating Attack Scenarios in Multihop Wireless Systems.
J. Networks, 2009

Visibility: a novel concept for characterising provable network digital evidences.
Int. J. Secur. Networks, 2009

Forensic Investigation in Communication Networks Using Incomplete Digital Evidences.
Int. J. Commun. Netw. Syst. Sci., 2009

A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

Digital Investigation of Wormhole Attacks in Wireless Sensor Networks.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Defending against rogue base station attacks using wavelet based fingerprinting.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Intrusion detection and tolerance: A global scheme.
Int. J. Commun. Syst., 2008

DigForNet: Digital Forensic in Networking.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Cognitive-Maps Based Investigation of Digital Security Incidents.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems.
Proceedings of the NTMS 2008, 2008

2006
Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A formal logic-based language and an automated verification tool for computer forensic investigation.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A Temporal Logic-Based Model for Forensic Investigation in Networked System Security.
Proceedings of the Computer Network Security, 2005

SDPPM: An IP traceback scheme for MANET.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Cooperative Intrusion Detection and Tolerance System.
Proceedings of the 12th IEEE International Conference on Electronics, 2005


  Loading...