default search action
Raphaël Khoury
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Rania Taleb, Sylvain Hallé, Raphaël Khoury:
A modular pipeline for enforcement of security properties at runtime. Ann. des Télécommunications 78(7-8): 429-457 (2023) - [j16]Rania Taleb, Sylvain Hallé, Raphaël Khoury:
Uncertainty in runtime verification: A survey. Comput. Sci. Rev. 50: 100594 (2023) - [c38]Kobra Khanmohammadi, Raphaël Khoury:
Half-Day Vulnerabilities: A study of the First Days of CVE Entries. CAMLIS 2023: 152-180 - [c37]Raphaël Khoury, Jérémy Bolduc, Jason Lafrenière-Nickopoulos, Abdel-Gany Odedele:
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives. FPS (1) 2023: 208-218 - [c36]Raphaël Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara:
How Secure is Code Generated by ChatGPT? SMC 2023: 2445-2451 - [c35]Asma Razgallah, Raphaël Khoury, Kobra Khanmohammadi, Christophe Pere:
Comparing the Effectiveness of Static, Dynamic and Hybrid Malware Detection on a Common Dataset. SMC 2023: 2452-2458 - [i6]Kobra Khanmohammadi, Raphaël Khoury:
Half-Day Vulnerabilities: A study of the First Days of CVE Entries. CoRR abs/2303.07990 (2023) - [i5]Raphaël Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara:
How Secure is Code Generated by ChatGPT? CoRR abs/2304.09655 (2023) - 2022
- [j15]Raphaël Khoury, Sylvain Hallé:
Are Backdoor Mandates Ethical? - A Position Paper. IEEE Technol. Soc. Mag. 41(4): 63-70 (2022) - [c34]Asma Razagallah, Raphaël Khoury, Jean-Baptiste Poulet:
TwinDroid: A Dataset of Android app System call traces and Trace Generation Pipeline. MSR 2022: 591-595 - [c33]Raphaël Khoury:
A Taxonomy of Software Flaws Leading to Buffer Overflows. QRS 2022: 1-8 - 2021
- [j14]Asma Razgallah, Raphaël Khoury, Sylvain Hallé, Kobra Khanmohammadi:
A survey of malware detection in Android apps: Recommendations and perspectives for future research. Comput. Sci. Rev. 39: 100358 (2021) - [j13]Massiva Roudjane, Djamal Rebaïne, Raphaël Khoury, Sylvain Hallé:
Detecting trend deviations with generic stream processing patterns. Inf. Syst. 101: 101446 (2021) - [j12]Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj:
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. J. Syst. Archit. 116: 102143 (2021) - [j11]Ricardo Ávila, Raphaël Khoury, Richard Khoury, Fábio Petrillo:
Use of Security Logs for Data Leak Detection: A Systematic Literature Review. Secur. Commun. Networks 2021: 6615899:1-6615899:29 (2021) - [j10]Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj:
The Botnet Simulator: A simulation tool for understanding the interaction between botnets. Softw. Impacts 10: 100173 (2021) - [j9]Raphaël Khoury, Sylvain Hallé, Yannick Lebrun:
Automata-based monitoring for LTL-FO+. Int. J. Softw. Tools Technol. Transf. 23(2): 137-154 (2021) - [c32]Asma Razgallah, Raphaël Khoury:
Behavioral classification of Android applications using system calls. APSEC 2021: 43-52 - [c31]Ricardo Ávila, Raphaël Khoury, Christophe Pere, Kobra Khanmohammadi:
Employing Feature Selection to Improve the Performance of Intrusion Detection Systems. FPS 2021: 93-112 - [c30]Rania Taleb, Sylvain Hallé, Raphaël Khoury:
A Modular Runtime Enforcement Model Using Multi-traces. FPS 2021: 283-302 - [c29]Rania Taleb, Raphaël Khoury, Sylvain Hallé:
Runtime Verification Under Access Restrictions. FormaliSE@ICSE 2021: 31-41 - [c28]Sylvain Hallé, Raphaël Khoury:
Test Sequence Generation with Cayley Graphs. ICST Workshops 2021: 182-191 - 2020
- [c27]Raphaël Khoury, Benjamin Vignau, Sylvain Hallé, Abdelwahab Hamou-Lhadj, Asma Razgallah:
An Analysis of the Use of CVEs by IoT Malware. FPS 2020: 47-62
2010 – 2019
- 2019
- [j8]Kobra Khanmohammadi, Neda Ebrahimi, Abdelwahab Hamou-Lhadj, Raphaël Khoury:
Empirical study of android repackaged applications. Empir. Softw. Eng. 24(6): 3587-3629 (2019) - [j7]Quentin Betti, Raphaël Khoury, Sylvain Hallé, Benoît Montreuil:
Improving Hyperconnected Logistics With Blockchains and Smart Contracts. IT Prof. 21(4): 25-32 (2019) - [c26]Massiva Roudjane, Djamal Rebaine, Raphaël Khoury, Sylvain Hallé:
Predictive Analytics for Event Stream Processing. EDOC 2019: 171-182 - [c25]Kobra Khanmohammadi, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas. ISSRE Workshops 2019: 116-117 - [c24]Raphaël Khoury, Abdelwahab Hamou-Lhadj, Mohamed Ilyes Rahim, Sylvain Hallé, Fábio Petrillo:
TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension. ISSRE Workshops 2019: 406-413 - [c23]Benjamin Vignau, Raphaël Khoury, Sylvain Hallé:
10 Years of IoT Malware: A Feature-Based Taxonomy. QRS Companion 2019: 458-465 - [i4]Quentin Betti, Raphaël Khoury, Sylvain Hallé, Benoît Montreuil:
Improving Hyperconnected Logistics with Blockchains and Smart Contracts. CoRR abs/1904.03633 (2019) - 2018
- [j6]Sylvain Hallé, Raphaël Khoury, Mewena Awesso:
Streamlining the Inclusion of Computer Experiments In a Research Paper. Computer 51(11): 78-89 (2018) - [j5]Sylvain Hallé, Raphaël Khoury, Quentin Betti, Antoine El-Hokayem, Yliès Falcone:
Decentralized enforcement of document lifecycle constraints. Inf. Syst. 74(Part): 117-135 (2018) - [c22]Massiva Roudjane, Djamal Rebaine, Raphaël Khoury, Sylvain Hallé:
Real-Time Data Mining for Event Streams. EDOC 2018: 123-134 - [c21]Raphaël Khoury, Sylvain Hallé:
Tally Keeping-LTL: An LTL Semantics for Quantitative Evaluation of LTL Specifications. IRI 2018: 495-502 - [c20]Sylvain Hallé, Raphaël Khoury:
Writing Domain-Specific Languages for BeepBeep. RV 2018: 447-457 - [r2]Richard Khoury, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
Microtext Processing. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [c19]Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé:
Monitoring of Security Properties Using BeepBeep. FPS 2017: 160-169 - [c18]Sylvain Hallé, Raphaël Khoury:
SealTest: a simple library for test sequence generation. ISSTA 2017: 392-395 - [c17]Sylvain Hallé, Raphaël Khoury:
Event Stream Processing with BeepBeep 3. RV-CuBES 2017: 81-88 - [c16]Sylvain Hallé, Raphaël Khoury, Sébastien Gaboury:
A Few Things We Heard About RV Tools (Position Paper). RV-CuBES 2017: 89-95 - [c15]Sylvain Hallé, Raphaël Khoury, Sébastien Gaboury:
Event Stream Processing with Multiple Threads. RV 2017: 359-369 - [i3]Sylvain Hallé, Raphaël Khoury, Sébastien Gaboury:
Event Stream Processing with Multiple Threads. CoRR abs/1707.02600 (2017) - 2016
- [c14]Sylvain Hallé, Sébastien Gaboury, Raphaël Khoury:
A glue language for event stream processing. IEEE BigData 2016: 2384-2391 - [c13]Sylvain Hallé, Raphaël Khoury, Antoine El-Hokayem, Yliès Falcone:
Decentralized Enforcement of Artifact Lifecycles. EDOC 2016: 1-10 - [c12]Raphaël Khoury, Sébastien Gaboury, Sylvain Hallé:
Three Views of Log Trace Triaging. FPS 2016: 179-195 - [c11]Raphaël Khoury, Lei Shi, Abdelwahab Hamou-Lhadj:
Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle. ICSME 2016: 478-482 - [c10]Raphaël Khoury, Sylvain Hallé, Omar Waldmann:
Execution Trace Analysis Using LTL-FO ^+. ISoLA (2) 2016: 356-362 - [i2]Yannick Lebrun, Raphaël Khoury, Sylvain Hallé:
An Alternating Automaton for First-Order Linear Temporal Logic-Tech Report. CoRR abs/1610.07080 (2016) - 2015
- [j4]Raphaël Khoury, Nadia Tawbi:
Equivalence-preserving corrective enforcement of security properties. Int. J. Inf. Comput. Secur. 7(2/3/4): 113-139 (2015) - [c9]Raphaël Khoury, Sylvain Hallé:
Runtime Enforcement with Partial Control. FPS 2015: 102-116 - [c8]Sylvain Hallé, Raphaël Khoury:
Runtime Monitoring of Stream Logic Formulae. FPS 2015: 251-258 - [c7]Raphaël Khoury:
Symbolic analysis of assembly traces: Lessons learned and perspectives. PCODA@SANER 2015: 7-12 - [i1]Raphaël Khoury, Sylvain Hallé:
Runtime Enforcement With Partial Control. CoRR abs/1508.06525 (2015) - 2014
- [r1]Richard Khoury, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
Microtext Processing. Encyclopedia of Social Network Analysis and Mining 2014: 894-904 - 2013
- [c6]Abdelwahab Hamou-Lhadj, Syed Shariyar Murtaza, Waseem Fadel, Ali Mehrabian, Mario Couture, Raphaël Khoury:
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction. RACS 2013: 328-335 - 2012
- [j3]Raphaël Khoury, Nadia Tawbi:
Which security policies are enforceable by runtime monitors? A survey. Comput. Sci. Rev. 6(1): 27-45 (2012) - [j2]Raphaël Khoury, Nadia Tawbi:
Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors. ACM Trans. Inf. Syst. Secur. 15(2): 10:1-10:27 (2012) - [c5]Raphaël Khoury, Abdelwahab Hamou-Lhadj, Mario Couture:
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security. CISDA 2012: 1-7 - 2011
- [j1]Hugues Chabot, Raphaël Khoury, Nadia Tawbi:
Extending the enforcement power of truncation monitors using static analysis. Comput. Secur. 30(4): 194-207 (2011) - [c4]Frédérick Lemay, Raphaël Khoury, Nadia Tawbi:
Optimized Inlining of Runtime Monitors. NordSec 2011: 149-161 - 2010
- [c3]Raphaël Khoury, Nadia Tawbi:
Corrective Enforcement of Security Policies. Formal Aspects in Security and Trust 2010: 176-190 - [c2]Raphaël Khoury, Nadia Tawbi:
Using Equivalence Relations for Corrective Enforcement of Security Policies. MMM-ACNS 2010: 139-154
2000 – 2009
- 2009
- [c1]Hugues Chabot, Raphaël Khoury, Nadia Tawbi:
Generating In-Line Monitors for Rabin Automata. NordSec 2009: 287-301
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint