팔로우
Raphaël Khoury
Raphaël Khoury
Université du Québec en Outaouais
uqac.ca의 이메일 확인됨
제목
인용
인용
연도
How secure is code generated by chatgpt?
R Khoury, AR Avila, J Brunelle, BM Camara
2023 IEEE international conference on systems, man, and cybernetics (SMC …, 2023
1142023
A survey of malware detection in Android apps: Recommendations and perspectives for future research
A Razgallah, R Khoury, S Hallé, K Khanmohammadi
Computer Science Review 39, 100358, 2021
932021
10 years of IoT malware: A feature-based taxonomy
B Vignau, R Khoury, S Hallé
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
822019
Improving hyperconnected logistics with blockchains and smart contracts
Q Betti, R Khoury, S Hallé, B Montreuil
IT Professional 21 (4), 25-32, 2019
602019
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives
B Vignau, R Khoury, S Hallé, A Hamou-Lhadj
Journal of Systems Architecture 116, 102143, 2021
432021
Empirical study of android repackaged applications
K Khanmohammadi, N Ebrahimi, A Hamou-Lhadj, R Khoury
Empirical Software Engineering 24, 3587-3629, 2019
342019
Streamlining the inclusion of computer experiments in a research paper
S Halle, R Khoury, M Awesso
Computer 51 (11), 78-89, 2018
332018
Extending the enforcement power of truncation monitors using static analysis
H Chabot, R Khoury, N Tawbi
computers & security 30 (4), 194-207, 2011
332011
Which security policies are enforceable by runtime monitors? a survey
R Khoury, N Tawbi
Computer Science Review 6 (1), 27-45, 2012
312012
Corrective enforcement: A new paradigm of security policy enforcement by monitors
R Khoury, N Tawbi
ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-27, 2012
272012
Use of security logs for data leak detection: a systematic literature review
R Ávila, R Khoury, R Khoury, F Petrillo
Security and communication networks 2021 (1), 6615899, 2021
242021
Event Stream Processing with BeepBeep 3.
S Hallé, R Khoury
RV-CuBES, 81-88, 2017
242017
Execution trace analysis using ltl-fo
R Khoury, S Hallé, O Waldmann
International Symposium on Leveraging Applications of Formal Methods, 356-362, 2016
212016
Decentralized enforcement of document lifecycle constraints
S Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone
Information Systems 74, 117-135, 2018
202018
An analysis of the use of cves by iot malware
R Khoury, B Vignau, S Hallé, A Hamou-Lhadj, A Razgallah
Foundations and Practice of Security: 13th International Symposium, FPS 2020 …, 2021
182021
Smart contracts-enabled simulation for hyperconnected logistics
Q Betti, B Montreuil, R Khoury, S Hallé
Decentralised internet of things: A blockchain perspective, 109-149, 2020
162020
Runtime verification under access restrictions
R Taleb, R Khoury, S Hallé
2021 IEEE/ACM 9th International Conference on Formal Methods in Software …, 2021
152021
Monitoring of security properties using BeepBeep
MR Boussaha, R Khoury, S Hallé
Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018
152018
Writing domain-specific languages for BeepBeep
S Hallé, R Khoury
Runtime Verification: 18th International Conference, RV 2018, Limassol …, 2018
142018
Event stream processing with multiple threads
S Hallé, R Khoury, S Gaboury
Runtime Verification: 17th International Conference, RV 2017, Seattle, WA …, 2017
142017
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20