I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Khoury, Raphaël
58
results:
Articles (Online) X
Search for persons
X
Sorted by: Relevance
Sorted by: Year
?
1
Uncertainty in runtime verification: A survey:
Taleb, Rania
;
Hallé, Sylvain
;
Khoury, Raphaël
Computer Science Review. 50 (2023) - p. 100594 , 2023
Link:
https://doi.org/10.1016/..
?
2
A modular pipeline for enforcement of security properties a..:
Taleb, Rania
;
Hallé, Sylvain
;
Khoury, Raphaël
Annals of Telecommunications. 78 (2023) 7-8 - p. 429-457 , 2023
Link:
https://doi.org/10.1007/..
?
3
Are Backdoor Mandates Ethical?—A Position Paper:
Khoury, Raphael
;
Halle, Sylvain
IEEE Technology and Society Magazine. 41 (2022) 4 - p. 63-70 , 2022
Link:
https://doi.org/10.1109/..
?
4
A survey of malware detection in Android apps: Recommendati..:
Razgallah, Asma
;
Khoury, Raphaël
;
Hallé, Sylvain
.
Computer Science Review. 39 (2021) - p. 100358 , 2021
Link:
https://doi.org/10.1016/..
?
5
Detecting trend deviations with generic stream processing p..:
Roudjane, Massiva
;
Rebaïne, Djamal
;
Khoury, Raphaël
.
Information Systems. 101 (2021) - p. 101446 , 2021
Link:
https://doi.org/10.1016/..
?
6
The evolution of IoT Malwares, from 2008 to 2019: Survey, t..:
Vignau, Benjamin
;
Khoury, Raphaël
;
Hallé, Sylvain
.
Journal of Systems Architecture. 116 (2021) - p. 102143 , 2021
Link:
https://doi.org/10.1016/..
?
7
The Botnet Simulator: A simulation tool for understanding t..:
Vignau, Benjamin
;
Khoury, Raphaël
;
Hallé, Sylvain
.
Software Impacts. 10 (2021) - p. 100173 , 2021
Link:
https://doi.org/10.1016/..
?
8
Use of Security Logs for Data Leak Detection: A Systematic ..:
Ávila, Ricardo
;
Khoury, Raphaël
;
Khoury, Richard
..
Security and Communication Networks. 2021 (2021) - p. 1-29 , 2021
Link:
https://doi.org/10.1155/..
?
9
Automata-based monitoring for LTL-FO$$^+$$:
Khoury, Raphaël
;
Hallé, Sylvain
;
Lebrun, Yannick
International Journal on Software Tools for Technology Transfer. 23 (2020) 2 - p. 137-154 , 2020
Link:
https://doi.org/10.1007/..
?
10
Empirical study of android repackaged applications:
Khanmohammadi, Kobra
;
Ebrahimi, Neda
;
Hamou-Lhadj, Abdelwahab
.
Empirical Software Engineering. 24 (2019) 6 - p. 3587-3629 , 2019
Link:
https://doi.org/10.1007/..
?
11
Improving Hyperconnected Logistics With Blockchains and Sma..:
Betti, Quentin
;
Khoury, Raphael
;
Halle, Sylvain
.
IT Professional. 21 (2019) 4 - p. 25-32 , 2019
Link:
https://doi.org/10.1109/..
?
12
Decentralized enforcement of document lifecycle constraints:
Hallé, Sylvain
;
Khoury, Raphaël
;
Betti, Quentin
..
Information Systems. 74 (2018) - p. 117-135 , 2018
Link:
https://doi.org/10.1016/..
?
13
Streamlining the Inclusion of Computer Experiments In a Res..:
Halle, Sylvain
;
Khoury, Raphael
;
Awesso, Mewena
Computer. 51 (2018) 11 - p. 78-89 , 2018
Link:
https://doi.org/10.1109/..
?
14
Which security policies are enforceable by runtime monitors..:
Khoury, Raphaël
;
Tawbi, Nadia
Computer Science Review. 6 (2012) 1 - p. 27-45 , 2012
Link:
https://doi.org/10.1016/..
?
15
Corrective Enforcement : A New Paradigm of Security Poli..:
Khoury, Raphaël
;
Tawbi, Nadia
ACM Transactions on Information and System Security (TISSEC). 15 (2012) 2 - p. 1-27 , 2012
Link:
https://dl.acm.org/doi/1..
1-15