Saoussen Rekhis

Learn More
In this paper, we provide a logic for digital investigation of security incidents and its high level-specification language. The logic is used to prove the existence or non-existence of potential attack scenarios which, if executed on the investigated system, would produce the different forms of specified evidences. To generate executable attack scenarios(More)
The security of information systems is generally related to the deployed tools to protect the network infrastructure from attacks. These latter are based on detection components that analyze the information transmitted through the network. The existing systems do not provide a full protection and present a high rate of false positives that could result from(More)
The design of Real-Time (RT) applications is a difficult task since it must take into account the specification of time-constrained data and timeconstrained transactions. The design of these applications can be facilitated through the reuse of RT design patterns that improve software quality and capture RT domain knowledge and design expertise. However, the(More)
Real-Time (RT) applications, which manipulate important volumes of data, need to be managed with RT databases that deal with time-constrained data and time-constrained transactions. In spite of their numerous advantages, RT databases development remains a complex task, since developers must study many design issues related to the RT domain. In this paper,(More)
Domain Specific Design Patterns are sets of objects and components that capture the experts knowledge and that can be used in a specific software domain. They provide for a higher software quality and a reduced development cost. However, their design remains a difficult task due to the generality and variability they must encompass, in order to be(More)
We present in this paper a novel approach that integrates opacity theory to digital forensic investigation. Our approach adds multi-observability and new classes of properties to opacity. It shows the appropriateness of using opacity in proving evidences related to hacking activities and characterizes what is provable. A temporal logic of security action(More)
The scarcity of resources in wireless communications and the experience of attackers in conducting Denial of Service (DoS) and Distributed DoS attacks in Internet make detection and reaction against these attacks in cellular networks, particularly in the 2.5G and 3G cases, a challenging issue to address. CODERA (Cooperative DEtection and Reaction(More)
Domain-specific design patterns provide for architecture reuse of reoccurring design problems in a specific software domain. They capture domain knowledge and design expertise needed for developing applications. Moreover, they accelerate software development since the design of a new application consists in adapting existing patterns, instead of modeling(More)
The analysis patterns improve the quality of products and the performance of development process. They have proven to be an effective means for capturing expert’s knowledge and reducing the costs and the time of development. In this paper, we are interested in defining analysis patterns to model both the functional and nonfunctional requirements of(More)