The SCEAS System
Navigation Menu

Search the dblp DataBase


Slim Rekhis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Slim Rekhis, Noureddine Boudriga
    A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:325-338 [Conf]
  2. Slim Rekhis, Noureddine Boudriga
    A formal logic-based language and an automated verification tool for computer forensic investigation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:287-291 [Conf]
  3. Slim Rekhis, Noureddine Boudriga
    Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  4. Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  5. A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks. [Citation Graph (, )][DBLP]

  6. Cognitive-Maps Based Investigation of Digital Security Incidents. [Citation Graph (, )][DBLP]

  7. DigForNet: Digital Forensic in Networking. [Citation Graph (, )][DBLP]

  8. Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems. [Citation Graph (, )][DBLP]

  9. Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002