Joseph Khoury

Orcid: 0000-0002-6219-2875

According to our database1, Joseph Khoury authored at least 27 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
1
4
2
1
1
3
3
3
1
2
3
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
An Internet-Scale Data-Driven Approach for Exploring Cyber Threats Amid Global Conflicts.
IEEE Internet Things Mag., January, 2025

2024
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security.
IEEE Trans. Netw. Serv. Manag., February, 2024

Enhancing Reverse Engineering: Investigating and Benchmarking Large Language Models for Vulnerability Analysis in Decompiled Binaries.
CoRR, 2024

Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs.
CoRR, 2024

LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward.
CoRR, 2024

Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Characterizing and Analyzing LEO Satellite Cyber Landscape: A Starlink Case Study.
Proceedings of the IEEE International Conference on Communications, 2024

Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

2023
Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics.
Proceedings of the Complex Computational Ecosystems - First International Conference, 2023

2022
An efficient three-dimensional prediction structure for coding light field video content using the MV-HEVC standard.
Int. J. Multim. Intell. Secur., 2022

A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment.
Comput. Networks, 2022

HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Interpretable Federated Transformer Log Learning for Cloud Threat Forensics.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

2020
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security.
Proceedings of the NOMS 2020, 2020


2019
On The Use of Software Defined Wireless Network in Vehicular Fog Computing Environments.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

An Efficient Random Access Light Field Video Compression Utilizing Diagonal Inter-View Prediction.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2017
Development of a Part Criticality Index in Inventory Management.
Proceedings of the Product Lifecycle Management and the Industry of the Future, 2017

2016
Error Generation, Inventory Record Inaccuracy (IRI) and Effects on Performance: A Dynamic Investigation.
Proceedings of the Product Lifecycle Management for Digital Transformation of Industries, 2016

2015
Evaluation of multi-product lean manufacturing systems with setup and erratic demand.
Comput. Ind. Eng., 2015

2013
A comparison of Kanban-Like control strategies in a multi-product manufacturing system under erratic demand.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013

2008
A Groebner basis approach to solve a Conjecture of Nowicki.
J. Symb. Comput., 2008


  Loading...