How secure is code generated by chatgpt? R Khoury, AR Avila, J Brunelle, BM Camara 2023 IEEE international conference on systems, man, and cybernetics (SMC …, 2023 | 114 | 2023 |
A survey of malware detection in Android apps: Recommendations and perspectives for future research A Razgallah, R Khoury, S Hallé, K Khanmohammadi Computer Science Review 39, 100358, 2021 | 93 | 2021 |
10 years of IoT malware: A feature-based taxonomy B Vignau, R Khoury, S Hallé 2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019 | 82 | 2019 |
Improving hyperconnected logistics with blockchains and smart contracts Q Betti, R Khoury, S Hallé, B Montreuil IT Professional 21 (4), 25-32, 2019 | 60 | 2019 |
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives B Vignau, R Khoury, S Hallé, A Hamou-Lhadj Journal of Systems Architecture 116, 102143, 2021 | 43 | 2021 |
Empirical study of android repackaged applications K Khanmohammadi, N Ebrahimi, A Hamou-Lhadj, R Khoury Empirical Software Engineering 24, 3587-3629, 2019 | 34 | 2019 |
Streamlining the inclusion of computer experiments in a research paper S Halle, R Khoury, M Awesso Computer 51 (11), 78-89, 2018 | 33 | 2018 |
Extending the enforcement power of truncation monitors using static analysis H Chabot, R Khoury, N Tawbi computers & security 30 (4), 194-207, 2011 | 33 | 2011 |
Which security policies are enforceable by runtime monitors? a survey R Khoury, N Tawbi Computer Science Review 6 (1), 27-45, 2012 | 31 | 2012 |
Corrective enforcement: A new paradigm of security policy enforcement by monitors R Khoury, N Tawbi ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-27, 2012 | 27 | 2012 |
Use of security logs for data leak detection: a systematic literature review R Ávila, R Khoury, R Khoury, F Petrillo Security and communication networks 2021 (1), 6615899, 2021 | 24 | 2021 |
Event Stream Processing with BeepBeep 3. S Hallé, R Khoury RV-CuBES, 81-88, 2017 | 24 | 2017 |
Execution trace analysis using ltl-fo R Khoury, S Hallé, O Waldmann International Symposium on Leveraging Applications of Formal Methods, 356-362, 2016 | 21 | 2016 |
Decentralized enforcement of document lifecycle constraints S Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone Information Systems 74, 117-135, 2018 | 20 | 2018 |
An analysis of the use of cves by iot malware R Khoury, B Vignau, S Hallé, A Hamou-Lhadj, A Razgallah Foundations and Practice of Security: 13th International Symposium, FPS 2020 …, 2021 | 18 | 2021 |
Smart contracts-enabled simulation for hyperconnected logistics Q Betti, B Montreuil, R Khoury, S Hallé Decentralised internet of things: A blockchain perspective, 109-149, 2020 | 16 | 2020 |
Runtime verification under access restrictions R Taleb, R Khoury, S Hallé 2021 IEEE/ACM 9th International Conference on Formal Methods in Software …, 2021 | 15 | 2021 |
Monitoring of security properties using BeepBeep MR Boussaha, R Khoury, S Hallé Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 15 | 2018 |
Writing domain-specific languages for BeepBeep S Hallé, R Khoury Runtime Verification: 18th International Conference, RV 2018, Limassol …, 2018 | 14 | 2018 |
Event stream processing with multiple threads S Hallé, R Khoury, S Gaboury Runtime Verification: 17th International Conference, RV 2017, Seattle, WA …, 2017 | 14 | 2017 |