Raphaël Khoury

Orcid: 0000-0002-7625-3384

According to our database1, Raphaël Khoury authored at least 57 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Uncertainty in runtime verification: A survey.
Comput. Sci. Rev., November, 2023

A modular pipeline for enforcement of security properties at runtime.
Ann. des Télécommunications, August, 2023

Comparing the Effectiveness of Static, Dynamic and Hybrid Malware Detection on a Common Dataset.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

How Secure is Code Generated by ChatGPT?
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Half-Day Vulnerabilities: A study of the First Days of CVE Entries.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

2022
Are Backdoor Mandates Ethical? - A Position Paper.
IEEE Technol. Soc. Mag., 2022

A Taxonomy of Software Flaws Leading to Buffer Overflows.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

TwinDroid: A Dataset of Android app System call traces and Trace Generation Pipeline.
Proceedings of the 19th IEEE/ACM International Conference on Mining Software Repositories, 2022

2021
Automata-based monitoring for LTL-FO<sup>+</sup>.
Int. J. Softw. Tools Technol. Transf., 2021

The Botnet Simulator: A simulation tool for understanding the interaction between botnets.
Softw. Impacts, 2021

Use of Security Logs for Data Leak Detection: A Systematic Literature Review.
Secur. Commun. Networks, 2021

The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives.
J. Syst. Archit., 2021

Detecting trend deviations with generic stream processing patterns.
Inf. Syst., 2021

A survey of malware detection in Android apps: Recommendations and perspectives for future research.
Comput. Sci. Rev., 2021

Test Sequence Generation with Cayley Graphs.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

Runtime Verification Under Access Restrictions.
Proceedings of the 9th IEEE/ACM International Conference on Formal Methods in Software Engineering, 2021

A Modular Runtime Enforcement Model Using Multi-traces.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Employing Feature Selection to Improve the Performance of Intrusion Detection Systems.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Behavioral classification of Android applications using system calls.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
An Analysis of the Use of CVEs by IoT Malware.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

2019
Improving Hyperconnected Logistics With Blockchains and Smart Contracts.
IT Prof., 2019

Empirical study of android repackaged applications.
Empir. Softw. Eng., 2019

10 Years of IoT Malware: A Feature-Based Taxonomy.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Predictive Analytics for Event Stream Processing.
Proceedings of the 23rd IEEE International Enterprise Distributed Object Computing Conference, 2019

2018
Microtext Processing.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Decentralized enforcement of document lifecycle constraints.
Inf. Syst., 2018

Streamlining the Inclusion of Computer Experiments In a Research Paper.
Computer, 2018

Writing Domain-Specific Languages for BeepBeep.
Proceedings of the Runtime Verification - 18th International Conference, 2018

Tally Keeping-LTL: An LTL Semantics for Quantitative Evaluation of LTL Specifications.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Real-Time Data Mining for Event Streams.
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Conference, 2018

2017
A Few Things We Heard About RV Tools (Position Paper).
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017

Event Stream Processing with Multiple Threads.
Proceedings of the Runtime Verification - 17th International Conference, 2017

Event Stream Processing with BeepBeep 3.
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017

SealTest: a simple library for test sequence generation.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Monitoring of Security Properties Using BeepBeep.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
An Alternating Automaton for First-Order Linear Temporal Logic-Tech Report.
CoRR, 2016

Execution Trace Analysis Using LTL-FO ^+.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016

Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Three Views of Log Trace Triaging.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Decentralized Enforcement of Artifact Lifecycles.
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Conference, 2016

A glue language for event stream processing.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Equivalence-preserving corrective enforcement of security properties.
Int. J. Inf. Comput. Secur., 2015

Symbolic analysis of assembly traces: Lessons learned and perspectives.
Proceedings of the 6th IEEE International Workshop on Program Comprehension through Dynamic Analysis, 2015

Runtime Enforcement with Partial Control.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Runtime Monitoring of Stream Logic Formulae.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

2014
Microtext Processing.
Encyclopedia of Social Network Analysis and Mining, 2014

2013
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

2012
Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors.
ACM Trans. Inf. Syst. Secur., 2012

Which security policies are enforceable by runtime monitors? A survey.
Comput. Sci. Rev., 2012

Towards a formal framework for evaluating the effectiveness of system diversity when applied to security.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

2011
Extending the enforcement power of truncation monitors using static analysis.
Comput. Secur., 2011

Optimized Inlining of Runtime Monitors.
Proceedings of the Information Security Technology for Applications, 2011

2010
Using Equivalence Relations for Corrective Enforcement of Security Policies.
Proceedings of the Computer Network Security, 2010

Corrective Enforcement of Security Policies.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

2009
Generating In-Line Monitors for Rabin Automata.
Proceedings of the Identity and Privacy in the Internet Age, 2009


  Loading...