Border surveillance monitoring using quadcopter UAV-aided wireless sensor networks S Berrahal, JH Kim, S Rekhis, N Boudriga, D Wilkins, J Acevedo Journal of Communications Software and Systems 12 (1), 67-82, 2016 | 73 | 2016 |
A system for formal digital forensic investigation aware of anti-forensic attacks S Rekhis, N Boudriga IEEE transactions on information forensics and security 7 (2), 635-650, 2011 | 62 | 2011 |
Cooperative data muling from ground sensors to base stations using UAVs E Tuyishimire, A Bagula, S Rekhis, N Boudriga 2017 IEEE Symposium on Computers and Communications (ISCC), 35-41, 2017 | 59 | 2017 |
Digital investigation of wormhole attacks in wireless sensor networks B Triki, S Rekhis, N Boudriga 2009 Eighth IEEE International Symposium on Network Computing and …, 2009 | 34 | 2009 |
A blockchain based secure IoT solution for the dam surveillance SBH Youssef, S Rekhis, N Boudriga 2019 IEEE wireless communications and networking conference (WCNC), 1-6, 2019 | 33 | 2019 |
Internet-of-things in motion: A cooperative data muling model for public safety A Bagula, E Tuyishimire, J Wadepoel, N Boudriga, S Rekhis 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016 | 31 | 2016 |
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks B Triki, S Rekhis, M Chammem, N Boudriga 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-8, 2013 | 28 | 2013 |
Security of implantable medical devices: Limits, requirements, and proposals N Ellouze, M Allouche, HB Ahmed, S Rekhis, N Boudriga Security and Communication Networks 7 (12), 2475-2491, 2014 | 27 | 2014 |
A temporal logic-based model for forensic investigation in networked system security S Rekhis, N Boudriga International Workshop on Mathematical Methods, Models, and Architectures …, 2005 | 25 | 2005 |
Formal digital investigation of anti-forensic attacks S Rekhis, N Boudriga 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital …, 2010 | 24 | 2010 |
Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform N Ellouze, S Rekhis, N Boudriga, M Allouche Journal of Network and Computer Applications 107, 1-21, 2018 | 23 | 2018 |
Internet of things in motion: A cooperative data muling model under revisit constraints E Tuyishimire, I Adiel, S Rekhis, BA Bagula, N Boudriga 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016 | 23 | 2016 |
Communication as a service for cloud VANETs M Garai, S Rekhis, N Boudriga 2015 IEEE Symposium on Computers and Communication (ISCC), 371-377, 2015 | 23 | 2015 |
Visibility: a novel concept for characterising provable network digital evidences S Rekhis, NA Boudriga International journal of security and networks 4 (4), 234-245, 2009 | 23 | 2009 |
Intrusion detection and tolerance: A global scheme Y Djemaiel, S Rekhis, N Boudriga International Journal of Communication Systems 21 (2), 211-230, 2008 | 23 | 2008 |
Unmanned aircraft vehicle assisted WSN-based border surveillance S Berrahal, JH Kim, S Rekhis, N Boudriga, D Wilkins, J Acevedo 2015 23rd International Conference on Software, Telecommunications and …, 2015 | 21 | 2015 |
Logic-based approach for digital forensic investigation in communication networks S Rekhis, N Boudriga Computers & Security 30 (6-7), 376-396, 2011 | 19 | 2011 |
A formal logic-based language and an automated verification tool for computer forensic investigation S Rekhis, N Boudriga Proceedings of the 2005 ACM symposium on Applied computing, 287-291, 2005 | 19 | 2005 |
Cardiac implantable medical devices forensics: Postmortem analysis of lethal attacks scenarios N Ellouze, S Rekhis, N Boudriga, M Allouche Digital Investigation 21, 11-30, 2017 | 17 | 2017 |
A novel secure and multipath routing algorithm in wireless sensor networks B Triki, S Rekhis, N Boudriga 2010 International Conference on Data Communication Networking (DCNET), 1-10, 2010 | 16 | 2010 |