Raphaël Khoury
Orcid: 0000-0002-7625-3384
According to our database1,
Raphaël Khoury
authored at least 58 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Ann. des Télécommunications, August, 2023
Comparing the Effectiveness of Static, Dynamic and Hybrid Malware Detection on a Common Dataset.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023
2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
TwinDroid: A Dataset of Android app System call traces and Trace Generation Pipeline.
Proceedings of the 19th IEEE/ACM International Conference on Mining Software Repositories, 2022
2021
Int. J. Softw. Tools Technol. Transf., 2021
The Botnet Simulator: A simulation tool for understanding the interaction between botnets.
Softw. Impacts, 2021
Secur. Commun. Networks, 2021
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives.
J. Syst. Archit., 2021
A survey of malware detection in Android apps: Recommendations and perspectives for future research.
Comput. Sci. Rev., 2021
Proceedings of the 14th IEEE International Conference on Software Testing, 2021
Proceedings of the 9th IEEE/ACM International Conference on Formal Methods in Software Engineering, 2021
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
Employing Feature Selection to Improve the Performance of Intrusion Detection Systems.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
2020
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
2019
IT Prof., 2019
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the 23rd IEEE International Enterprise Distributed Object Computing Conference, 2019
2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
Computer, 2018
Proceedings of the Runtime Verification - 18th International Conference, 2018
Tally Keeping-LTL: An LTL Semantics for Quantitative Evaluation of LTL Specifications.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Conference, 2018
2017
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017
Proceedings of the Runtime Verification - 17th International Conference, 2017
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
2016
CoRR, 2016
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016
Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Conference, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
2015
Int. J. Inf. Comput. Secur., 2015
Proceedings of the 6th IEEE International Workshop on Program Comprehension through Dynamic Analysis, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
2014
2013
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction.
Proceedings of the Research in Adaptive and Convergent Systems, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
Comput. Sci. Rev., 2012
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012
2011
Comput. Secur., 2011
Proceedings of the Information Security Technology for Applications, 2011
2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
2009
Proceedings of the Identity and Privacy in the Internet Age, 2009