Joseph Khoury
Orcid: 0000-0002-6219-2875
According to our database1,
Joseph Khoury
authored at least 27 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
1
4
2
1
1
3
3
3
1
2
3
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
An Internet-Scale Data-Driven Approach for Exploring Cyber Threats Amid Global Conflicts.
IEEE Internet Things Mag., January, 2025
2024
IEEE Trans. Netw. Serv. Manag., February, 2024
Enhancing Reverse Engineering: Investigating and Benchmarking Large Language Models for Vulnerability Analysis in Decompiled Binaries.
CoRR, 2024
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs.
CoRR, 2024
LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward.
CoRR, 2024
Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
2023
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics.
Proceedings of the Complex Computational Ecosystems - First International Conference, 2023
2022
An efficient three-dimensional prediction structure for coding light field video content using the MV-HEVC standard.
Int. J. Multim. Intell. Secur., 2022
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment.
Comput. Networks, 2022
HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
2020
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security.
Proceedings of the NOMS 2020, 2020
2019
On The Use of Software Defined Wireless Network in Vehicular Fog Computing Environments.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
An Efficient Random Access Light Field Video Compression Utilizing Diagonal Inter-View Prediction.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
2017
Proceedings of the Product Lifecycle Management and the Industry of the Future, 2017
2016
Error Generation, Inventory Record Inaccuracy (IRI) and Effects on Performance: A Dynamic Investigation.
Proceedings of the Product Lifecycle Management for Digital Transformation of Industries, 2016
2015
Evaluation of multi-product lean manufacturing systems with setup and erratic demand.
Comput. Ind. Eng., 2015
2013
A comparison of Kanban-Like control strategies in a multi-product manufacturing system under erratic demand.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013
2008