Joseph Khoury

Orcid: 0000-0002-6219-2875

According to our database1, Joseph Khoury authored at least 20 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security.
IEEE Trans. Netw. Serv. Manag., February, 2024

LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward.
CoRR, 2024

2023
Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics.
Proceedings of the Complex Computational Ecosystems - First International Conference, 2023

2022
An efficient three-dimensional prediction structure for coding light field video content using the MV-HEVC standard.
Int. J. Multim. Intell. Secur., 2022

A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment.
Comput. Networks, 2022

HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Interpretable Federated Transformer Log Learning for Cloud Threat Forensics.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

2020
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security.
Proceedings of the NOMS 2020, 2020


2019
On The Use of Software Defined Wireless Network in Vehicular Fog Computing Environments.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

An Efficient Random Access Light Field Video Compression Utilizing Diagonal Inter-View Prediction.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2017
Development of a Part Criticality Index in Inventory Management.
Proceedings of the Product Lifecycle Management and the Industry of the Future, 2017

2016
Error Generation, Inventory Record Inaccuracy (IRI) and Effects on Performance: A Dynamic Investigation.
Proceedings of the Product Lifecycle Management for Digital Transformation of Industries, 2016

2015
Evaluation of multi-product lean manufacturing systems with setup and erratic demand.
Comput. Ind. Eng., 2015

2013
A comparison of Kanban-Like control strategies in a multi-product manufacturing system under erratic demand.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013

2008
A Groebner basis approach to solve a Conjecture of Nowicki.
J. Symb. Comput., 2008


  Loading...