A survey of malware detection in Android apps: Recommendations and perspectives for future research A Razgallah, R Khoury, S Hallé, K Khanmohammadi Computer Science Review 39, 100358, 2021 | 76 | 2021 |
10 years of iot malware: A feature-based taxonomy B Vignau, R Khoury, S Hallé 2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019 | 69 | 2019 |
How secure is code generated by chatgpt? R Khoury, AR Avila, J Brunelle, BM Camara 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2023 | 50 | 2023 |
Improving hyperconnected logistics with blockchains and smart contracts Q Betti, R Khoury, S Hallé, B Montreuil IT Professional 21 (4), 25-32, 2019 | 47 | 2019 |
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives B Vignau, R Khoury, S Hallé, A Hamou-Lhadj Journal of Systems Architecture 116, 102143, 2021 | 34 | 2021 |
Empirical study of android repackaged applications K Khanmohammadi, N Ebrahimi, A Hamou-Lhadj, R Khoury Empirical Software Engineering 24, 3587-3629, 2019 | 33 | 2019 |
Streamlining the inclusion of computer experiments in a research paper S Halle, R Khoury, M Awesso Computer 51 (11), 78-89, 2018 | 33 | 2018 |
Extending the enforcement power of truncation monitors using static analysis H Chabot, R Khoury, N Tawbi computers & security 30 (4), 194-207, 2011 | 32 | 2011 |
Which security policies are enforceable by runtime monitors? A survey R Khoury, N Tawbi Computer Science Review 6 (1), 27-45, 2012 | 28 | 2012 |
Corrective enforcement: A new paradigm of security policy enforcement by monitors R Khoury, N Tawbi ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-27, 2012 | 25 | 2012 |
Event Stream Processing with BeepBeep 3. S Hallé, R Khoury RV-CuBES, 81-88, 2017 | 24 | 2017 |
Decentralized enforcement of document lifecycle constraints S Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone Information Systems 74, 117-135, 2018 | 21 | 2018 |
Execution trace analysis using ltl-fo R Khoury, S Hallé, O Waldmann International Symposium on Leveraging Applications of Formal Methods, 356-362, 2016 | 20 | 2016 |
Use of security logs for data leak detection: a systematic literature review R Ávila, R Khoury, R Khoury, F Petrillo Security and communication networks 2021, 1-29, 2021 | 17 | 2021 |
An analysis of the use of CVEs by IoT malware R Khoury, B Vignau, S Hallé, A Hamou-Lhadj, A Razgallah Foundations and Practice of Security: 13th International Symposium, FPS 2020 …, 2021 | 16 | 2021 |
Event stream processing with multiple threads S Hallé, R Khoury, S Gaboury Runtime Verification: 17th International Conference, RV 2017, Seattle, WA …, 2017 | 15 | 2017 |
Monitoring of security properties using BeepBeep MR Boussaha, R Khoury, S Hallé Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 14 | 2018 |
Smart contracts-enabled simulation for hyperconnected logistics Q Betti, B Montreuil, R Khoury, S Hallé Decentralised Internet of Things: A Blockchain Perspective, 109-149, 2020 | 13 | 2020 |
Corrective enforcement of security policies R Khoury, N Tawbi Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011 | 13 | 2011 |
Real-time data mining for event streams M Roudjane, D Rebaïne, R Khoury, S Hallé 2018 IEEE 22nd International Enterprise Distributed Object Computing …, 2018 | 12 | 2018 |