Seguir
Raphaël Khoury
Raphaël Khoury
Université du Québec en Outaouais
E-mail confirmado em uqac.ca
Título
Citado por
Citado por
Ano
A survey of malware detection in Android apps: Recommendations and perspectives for future research
A Razgallah, R Khoury, S Hallé, K Khanmohammadi
Computer Science Review 39, 100358, 2021
752021
10 years of iot malware: A feature-based taxonomy
B Vignau, R Khoury, S Hallé
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
692019
Improving hyperconnected logistics with blockchains and smart contracts
Q Betti, R Khoury, S Hallé, B Montreuil
IT Professional 21 (4), 25-32, 2019
472019
How secure is code generated by chatgpt?
R Khoury, AR Avila, J Brunelle, BM Camara
2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2023
452023
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives
B Vignau, R Khoury, S Hallé, A Hamou-Lhadj
Journal of Systems Architecture 116, 102143, 2021
332021
Empirical study of android repackaged applications
K Khanmohammadi, N Ebrahimi, A Hamou-Lhadj, R Khoury
Empirical Software Engineering 24, 3587-3629, 2019
332019
Streamlining the inclusion of computer experiments in a research paper
S Halle, R Khoury, M Awesso
Computer 51 (11), 78-89, 2018
332018
Extending the enforcement power of truncation monitors using static analysis
H Chabot, R Khoury, N Tawbi
computers & security 30 (4), 194-207, 2011
322011
Which security policies are enforceable by runtime monitors? A survey
R Khoury, N Tawbi
Computer Science Review 6 (1), 27-45, 2012
282012
Corrective enforcement: A new paradigm of security policy enforcement by monitors
R Khoury, N Tawbi
ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-27, 2012
252012
Event Stream Processing with BeepBeep 3.
S Hallé, R Khoury
RV-CuBES, 81-88, 2017
242017
Decentralized enforcement of document lifecycle constraints
S Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone
Information Systems 74, 117-135, 2018
212018
Execution trace analysis using ltl-fo
R Khoury, S Hallé, O Waldmann
International Symposium on Leveraging Applications of Formal Methods, 356-362, 2016
202016
Use of security logs for data leak detection: a systematic literature review
R Ávila, R Khoury, R Khoury, F Petrillo
Security and communication networks 2021, 1-29, 2021
162021
An analysis of the use of CVEs by IoT malware
R Khoury, B Vignau, S Hallé, A Hamou-Lhadj, A Razgallah
Foundations and Practice of Security: 13th International Symposium, FPS 2020 …, 2021
162021
Event stream processing with multiple threads
S Hallé, R Khoury, S Gaboury
Runtime Verification: 17th International Conference, RV 2017, Seattle, WA …, 2017
152017
Monitoring of security properties using BeepBeep
MR Boussaha, R Khoury, S Hallé
Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018
142018
Smart contracts-enabled simulation for hyperconnected logistics
Q Betti, B Montreuil, R Khoury, S Hallé
Decentralised Internet of Things: A Blockchain Perspective, 109-149, 2020
132020
Corrective enforcement of security policies
R Khoury, N Tawbi
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
132011
Real-time data mining for event streams
M Roudjane, D Rebaïne, R Khoury, S Hallé
2018 IEEE 22nd International Enterprise Distributed Object Computing …, 2018
122018
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20