Saoussen Rekhis

Learn More
In this paper, we provide a logic for digital investigation of security incidents and its high level-specification language. The logic is used to prove the existence or non-existence of potential attack scenarios which, if executed on the investigated system, would produce the different forms of specified evidences. To generate executable attack scenarios(More)
The design of Real-Time (RT) applications is a difficult task since it must take into account the specification of time-constrained data and time-constrained transactions. The design of these applications can be facilitated through the reuse of RT design patterns that improve software quality and capture RT domain knowledge and design expertise. However,(More)
Real-Time (RT) applications, which manipulate important volumes of data, need to be managed with RT databases that deal with time-constrained data and time-constrained transactions. In spite of their numerous advantages, RT databases development remains a complex task, since developers must study many design issues related to the RT domain. In this paper,(More)
The security of information systems is generally related to the deployed tools to protect the network infrastructure from attacks. These latter are based on detection components that analyze the information transmitted through the network. The existing systems do not provide a full protection and present a high rate of false positives that could result from(More)
Domain Specific Design Patterns are sets of objects and components that capture the experts knowledge and that can be used in a specific software domain. They provide for a higher software quality and a reduced development cost. However, their design remains a difficult task due to the generality and variability they must encompass, in order to be(More)
The scarcity of resources in wireless communications and the experience of attackers in conducting Denial of Service (DoS) and Distributed DoS attacks in Internet make detection and reaction against these attacks in cellular networks, particularly in the 2.5G and 3G cases, a challenging issue to address. CODERA (Cooperative DEtection and Reaction(More)
The use of domain-specific design patterns improves substantially software quality and reduce the development cost since they capture domain knowledge and provide solutions of non trivial design problems in a specific domain. In order to benefit from these advantages, these patterns must be correctly instantiated by application designers. When a pattern is(More)
— The analysis patterns improve the quality of products and the performance of development process. They have proven to be an effective means for capturing expert's knowledge and reducing the costs and the time of development. In this paper, we are interested in defining analysis patterns to model both the functional and non-functional requirements of(More)
Domain-specific design patterns provide for architecture reuse of reoccurring design problems in a specific software domain. They capture domain knowledge and design expertise needed for developing applications. Moreover, they accelerate software development since the design of a new application consists in adapting existing patterns, instead of modeling(More)