Espace membre

Cet espace est dédié aux étudiants, aux enseignants et au personnel administratif de l'école

Valider

Mot de passe oublié?

Liste des enseignants

Slim REKHIS

  • Grade : Maître Assistant
  • Spécialité : Télécommunications
  • Téléphone à l’institut + numéro de poste : 70 240 983
  • Email universitaire ou personnel : Slim REKHIS.jpg

 

Présentation


Dr. Slim Rekhis received the Ph.D. in Telecommunications from the Engineering School of Communications (Sup'Com), University of Carthage (Tunisia) in 2007. He is currently an Assistant Professor in Sup'Com and member of the Communication Networks and Security (CN&S) research laboratory. Dr. Rekhis is conducting research activities in the area of digital investigation of security incidents, formal verification of security protocols, intrusion detection and tolerance, traceback of host and network attacks, wireless sensor networks, and security of vehicular ad-hoc networks

 

Cours enseignés à Sup'Com

  • Level: Master
    • Digital Investigation of computer/Network Security Incidents. School: Sup'Com, Duration: 9 hours, Years: 2005/2006, 2006/2007
  • Level: Special training session in cryptography and security
    • Cyber Forensic. School: Sup'Com, Duration: 42 hours, Year: 2004/2005
  • Level: Engineer
    • Network-defense-and-countermeasures. School: Sup'Com, Duration: 21 hours, Years: 2012/2013
    • Intrusion Detection. School: Sup'Com, Duration: 21 hours, Years: 2012/2013
    • Network and Computer Forensics. School: Sup'Com, Duration: 42 hours, Years: 2012/2013
    • Linux Practice, School: Sup'Com, Duration 21 hours, Years: 2010/2011, 2011/2012
    • Intrusion Prevention, Detection and Response. School: Sup'Com, Duration: 21 hours, Years: 2007/2008, 2008/2009, 2009/2010 and 2010/2011, 2011/2012
    • Security of Virtual Private Networks. School: Sup'Com, Duration: 21 hours, Year: 2010/2011, 2011/2012
    • Communication Network Protocols and Architectures. School: Sup'Com, Duration: 33 hours, Year: 2010/2011, 2011/2012
    • Security of Operating Systems. School: Sup'Com, Duration: 21 hours, Years: 2010/2011
    • Security of E-services. School: Sup'Com, Duration: 21 hours, Years: 2010/2011
    • Security of Wireless Networks (only labs). School: Sup'Com, Duration: 6 hours, Year: 2008/2009

 

Expérience

  • September 2010 - Present: Assistant Professor in Telecommunication, School of Communication Engineering of Tunis (Sup'Com), Ariana,Tunisia
  • September 2007 - September 2010: Assistant Professor in Telecommunications, Institute of Technology in Communications at Tunis (ISET’Com), Ariana, Tunisia
  • September 2005 - September 2007: Assistant Teacher in Telecommunications, Higher Institute of Computing (ISI), Ariana, Tunisia
  • March 2002 - September 2005: Engineer in the National Digital Certification Agency. Tunisia

 

Formation

Stages/ post docs

 

Groupes de recherches

Member of the Communication Networks and Security Research Lab. (CN&S), Leader of the project : Formal techniques for risk analysis, security investigation, and security project management. CN&S Web site : http://www.cnas.org.tn

 

Publications

  • Books

 

[1] Slim Rekhis. Approche formelle pour la verication des IDS: Approche formelle pour la verication des Systemes de Detection d'Intrusions: Utilisation de TLA+. Editions Universitaires Europeennes, 2010

 

  • Chapters in edited books

 

[1] Slim Rekhis and Noureddine Boudriga. WiMAX Security Defined in 802.16 Standards. WiMAX Security and Quality of Service: An End-to-End Perspective, pages 25–62. John Wiley & Sons, Chichester, UK, 2010

 

[2] Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga. Trustworthy networks, authentication, privacy and security models. Handbook of Research on wireless Security, pages 189–209. Information Science Reference - Imprint of: IGI Publishing, Hershey, PA, USA, 2008

 

[3] Slim Rekhis, Noureddine Boudriga, and Mohammad S. Obaidat. Localization in Wireless Networks. The Handbook of Computer Networks, Volume II: LANs, MANs, WANs, The Internet, Global, Cellular and Wireless Networks, pages 1158–1177. John Wiley & Son, Hoboken, NJ, USA, 2007

 

[4] Slim Rekhis, Noureddine Boudriga, and Mohammad S. Obaidat. Server-Side Security. Handbook of Information Security, Volume III: Threats, Vulnerabilities, Prevention, Detection and Management Contents, pages 355–369. John Wiley & Sons, Hoboken, NJ, USA, December 2005

 

  • Journals papers

 

[1] Slim Rekhis and Noureddine Boudriga. A hierarchical visibility theory for formal digital investigation of anti-forensic attacks. Accepted for Publication in Computers & Security, 2012. http://dx.doi.org/10.1016/j.cose.2012.06.009 (2011 Impact factor: 0.868, 5-Year Impact Factor: 1.075)

 

[2] Slim Rekhis and Noureddine Boudriga. A system for formal digital forensic investigation aware of anti-forensic attacks. IEEE Transactions on Information Forensics and Security, 7(2):635–650, April 2012 (2011 Impact factor : 1.340)

 

[3] Slim Rekhis and Noureddine Boudriga. Logic-based approach for digital forensic investigation in communication networks. Computers & Security, 30(6-7):376–396, September-October 2011 (2011 Impact factor: 0.868, 5-Year Impact Factor: 1.075)

 

[4] Slim Rekhis and Noureddine Boudriga. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011:39, July 2011 (2011 Impact factor : 0.873)

 

[5] Slim Rekhis, Jihène Krichène, and Noureddine Boudriga. Forensic investigation in communication networks using incomplete digital evidences. International Journal of Communications, Network and System Sciences, 2(9):857–873, December 2009

 

[6] Slim Rekhis and Noureddine Boudriga. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks, 4(4):234–245, September 2009

 

[7] Slim Rekhis and Noureddine Boudriga. Investigating attack scenarios in multihop wireless systems. Journal of Networks, 4(7):539–551, September 2009

 

[8] Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga. Intrusion detection and tolerance: A global scheme. International Journal of Communication Systems, 21(2):211–230, February 2008 (2011 Impact factor: 0.406)

 

  • Conference papers with Proceedings (refereed)

 

[1] Slim Rekhis, Nourhene Ellouze, and Noureddine Boudriga. A wireless sensor network based water monitoring system. In Proceedings of The 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet), in conjunction with The 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Paphos, Cyprus Island, October 24-25 2012

 

[2] Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga. Mark Association-based Investigation of Attack Scenarios in Communication Networks. In Proceedings of First IEEE International Workshop on Security and Forensics in Communication Systems (SFCS'12) in conjunction with IEE International Conference on Communications (ICC'12), Ottawa, Canda. June 15, 2012

 

[3] Bayrem Triki, Slim Rekhis, and Noureddine Boudriga. Threshold based multipath routing algorithm in mobile adhoc and sensor networks. In Communications in Computer and Information Science, volume 222, pages 54–70. Springer Berlin Heidelberg, 2012

 

[4] Slim Rekhis, Baha Bennour, and Noureddine Boudriga. Validation of Security Solutions for Communication Networks: A Policy-based Approach. In Proceedings of the 10th IEEE International Symposium on Network Computing and Applications (NCA'11), Cambridge, MA, USA. August 25-27, 2011

 

[5] Bayrem Triki, Slim Rekhis, and Noureddine Boudriga. Secure and QoS-aware SIP handover for VoIP Communication in Vehicular Adhoc Networks. In Proceedings of The 7th International Wireless Communications and Mobile Computing Conference (IWCMC'11), Istanbul, Turkey. July 5-8, 2011

 

[6] Bayrem Triki, Slim Rekhis, and Noureddine Boudriga. Survivable Routing in all Optical Networks. In Proceedings of 13th International Conference on Transparent Optical Networks (ICTON 2011), Stockholm, Sweden. June 26-30, 2011

 

[7] Nejd Ben Hamza, Slim Rekhis, and Noureddine Boudriga. Cooperative Architecture for QoS Management in Wireless 4G Networks. In Proceedings of IEEE Symposium on Computers & Informatics (ISCI’11), Kuala Lumpur, Malaysia. March 20-22, 2011

 

[8] Bayrem Triki, Slim Rekhis, and Noureddine Boudriga. An RFID based System for Digital Investigation in Vehicular Adhoc Networks. In Proceedings of Workshop on Mobile Computing and Emerging Communication Networks (MCEN’10) in conjunction with IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA. December 10, 2010

 

[9] Bayrem Triki, Slim Rekhis, and Noureddine Boudriga. A novel secure and multipath routing algorithm in wireless sensor networks. In Proceedings of International Conference on Data Communication Networking (DCNet 2010), part of ICETE, the International Joint Conference on e-Business and Telecommunications. Athens, Greece. July 26-28, 2010. (Best Student Paper Award)


[10] Slim Rekhis and Noureddine Boudriga. Formal Digital Investigation of Anti-forensic Attacks. In Proceedings of the Fifth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'10), In conjunction with the IEEE Security and Privacy Symposium (SSP'10), Oakland, CA, USA. May 20, 2010

 

[11] Boutheina Fessi, Salah Ben Abdallah, Mohamed Hamdi, Slim Rekhis, and Noureddine Boudriga. Data Collection for Information Security System. In Proceedings of the Second International Conference on Engineering Systems Management & Applications (ICESMA 2010), Sharjah, UAE. March 30 - April 1, 2010

 

[12] Slim Rekhis and Noureddine Boudriga. Pattern-based digital investigation of x-hole attacks in wireless networks. In Proceedings of International Conference on Ultra Modern Telecommunications, St.-Petersburg, Russia, 12-14 October 2009

 

[13] Bayrem Triki, Slim Rekhis, and Noureddine Boudriga. Digital investigation of wormhole attacks in wireless sensor networks. In Proceedings of 8th IEEE International Symposium on Network Computing and Applications (IEEE NCA09), Cambridge, MA, USA, 9 - 11 July 2009

 

[14] Slim Rekhis and Noureddine Boudriga. A Formal Rule-based Scheme for Digital Investigation in Wireless Ad-hoc Networks. In Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering In conjunction with the IEEE Security and Privacy Symposium (SADFE-2009), Oakland, CA, USA. May 21, 2009

 

[15] Alaeddine Chouchane, Slim Rekhis, and Noureddine Boudriga. Defending against Rogue Base Station Attacks Using Wavelet Based Fingerprinting. In Proceedings of Accepted in the 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-2009), Rabat, Morocco. May 2009

 

[16] Slim Rekhis and Noureddine Boudriga. Digital Investigation in Multi-Layered Wireless Sensor Networks. In Proceeding of the IASTED International Symposium on Distributed Sensor Networks (DSN 2008). Orlando, Florida, USA. November 16 – 18, 2008

 

[17] Slim Rekhis and Noureddine Boudriga. Attack scenarios reconstruction and paths of packets transfer identification in multihop wireless systems. In Proceedings of the the workshop on Security of Wireless Communication Systems (SWCS’08) in association with second International Conference on New Technologies, Mobility and Security. Tangier, Morocco 5-7 November 2008

 

[18] Slim Rekhis, Jihene Krichene, and Noureddine BOUDRIGA. DigForNet: Digital Forensic in Networking. In Proceedings of the 3rd International Information Security Conference (SEC 2008), Milan, Italy - September 8 - 10, 2008

 

[19] Slim Rekhis, Jihene Krichene, and Noureddine Boudriga. Cognitive-Maps based Investigation of Digital Security Incidents. In Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE2008), Oakland, CA, May 22, 2008


[20] Slim Rekhis and Noureddine Boudriga. A Formal Approach for the Reconstruction of Potential Attack Scenarios. In Proceedings of the 3rd International Conference on Information & Communication Technologies: from Theory to Applications (ICTTA’08), Damascus, Syria, April 7-11, 2008

 

[21] Slim Rekhis, Alaaedine CHOUCHANE, and Noureddine BOUDRIGA. Detection and Reaction against DDoS Attacks in Cellular Networks. In Proceedings of the 3rd International Conference on Information & Communication Technologies: from Theory to Applications (ICTTA’08), Damascus, Syria, April 7-11, 2008

 

[22] Slim Rekhis and Noureddine Boudriga. Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation. In Proceedings of 49th Annual IEEE GLOBECOM conference, San Francisco, California, 27 November - 1 December, 2006

 

[23] Slim Rekhis and Noureddine Boudriga. Visibility: A Novel Concept for Characterizing Provable Network Digital Evidences. In Proceedings of 8th International Symposium on System and Information Security, Sao Paulo, Brazil, 08-10 November, 2006

 

[24] Slim Rekhis and Noureddine Boudriga. Opacity: A Theoretical Technique for Digital Investigation. In Proceedings of 2nd IEEE International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, Syria, 24-28 April, 2006

 

[25] Faouzi Zarai, Slim Rekhis, Noureddine Boudriga, and Kamel Zidene. SDPPM: An IP Traceback Scheme for MANET. In Proceedings of 12th IEEE International Conference on Electronics, Circuits, and Systems, pages 127-130, Tunis, Tunisia, 11-14 December, 2005

 

[26] Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga. Cooperative Intrusion Detection and Tolerance System. In Proceedings of 12th IEEE International Conference on Electronics, Circuits, and Systems, pages 297-300, Tunis, Tunisia, 11-14 December, 2005

 

[27] Slim Rekhis and Noureddine Boudriga. A Temporal Logic-based Model for Forensic Investigation in Networked System Security. In Proceedings of the Third International Workshop Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS-05), pages 325-338, St. Petersburg, Russia, 24-28 September, 2005. Springer Verlag, LNCS 3685

 

[28] Slim Rekhis and Noureddine Boudriga. Formal Forensic Investigation Eluding Disk-based Anti-forensic Attacks. In Proceedings of Workshop on Information Security Applications, Jeju Island, Korea, 22-24 August, 2005

 

[29] Yacine Djemaiel, Slim Rekhis, and Noureddine Boudriga. Adaptive and Selective Packet Marking in Communication Networks. In Proceedings of 9th WSEAS International conference on Communications, Athene, Greece, 14-16 July, 2005


[30] Slim REKHIS and Noureddine Boudriga. A Formal Logic-based Language and an Automated Verification Tool for Computer Forensic Investigation. In Proceedings of the 2005 ACM symposium on Applied computing, pages 287-291, Santa Fe, New Mexico, 13-17 March, 2005

 

[31] Slim Rekhis and Noureddine Boudriga. Formal Verification of Intrusion Detection Systems Using TLA+. In Proceeding of Workshop on Issues in the Theory of Security (WITS'04) in association with European Joint Conferences on Theory and Practice of Software (ETAPS 04), Barcelona, Spain, 3-4 April, 2004