Slim Rekhis
Orcid: 0000-0002-6507-6300
According to our database1,
Slim Rekhis
authored at least 70 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Reinforcement Learning for Intelligent Sensor Virtualization and Provisioning in Internet of Vehicles (IoV).
IEEE Access, 2024
2022
Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV).
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
2021
IEEE Trans. Sustain. Comput., 2021
Networking research for the Arab world: from regional initiatives to potential global impact.
Commun. ACM, 2021
Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial Tactics.
Proceedings of the IEEE Security and Privacy Workshops, 2021
Connected Medical Kiosks to Counter COVID-19: Needs, Architecture & Design Guidelines.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
2020
Proceedings of the 28th International Conference on Software, 2020
Active, Reactive and Proactive Visibility-Based Cyber Defense For Defending Against Attacks On Critical Systems.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
A trust-aware micropayment system for data muling in cloud environment: a Blockchain based approach.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020
2019
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios.
J. Univers. Comput. Sci., 2019
CoRR, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Scalable and Secure Mobile Sensor Cloud Architecture for the Delivery of Surveillance Applications As A Service.
Proceedings of the MoMM 2019: The 17th International Conference on Advances in Mobile Computing & Multimedia, 2019
2018
Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform.
J. Netw. Comput. Appl., 2018
A Context-Based Model for Validating the Ability of Cyber Systems to Defend Against Attacks.
Proceedings of the Ubiquitous Networking - 4th International Symposium, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018
2017
Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios.
Digit. Investig., 2017
A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
2016
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016
Internet of Things in Motion: A Cooperative Data Muling Model Under Revisit Constraints.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
2015
Proceedings of the 23rd International Conference on Software, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
2014
Secur. Commun. Networks, 2014
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014
Proceedings of the Ad-hoc Networks and Wireless, 2014
2013
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Securing implantable cardiac medical devices: use of radio frequency energy harvesting.
Proceedings of the TrustED'13, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks.
Comput. Secur., 2012
Proceedings of the Q2SWinet'12, 2012
A mark association-based investigation of attack scenarios in communication networks.
Proceedings of IEEE International Conference on Communications, 2012
2011
EURASIP J. Wirel. Commun. Netw., 2011
Comput. Secur., 2011
Validation of Security Solutions for Communication Networks: A Policy-Based Approach.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011
Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
2010
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
A Novel Secure and Multipath Routing Algorithm in Wireless Sensor Networks.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
2009
Int. J. Secur. Networks, 2009
Int. J. Commun. Netw. Syst. Sci., 2009
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems.
Proceedings of the NTMS 2008, 2008
2006
Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
A formal logic-based language and an automated verification tool for computer forensic investigation.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security.
Proceedings of the Computer Network Security, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005