Khoury, Raphaël
210  results:
Search for persons X
?
1

Analysis of Cryptographic CVEs: Lessons Learned and Perspec..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
 
?
3

Comparing the Effectiveness of Static, Dynamic and Hybrid M..:

, In: 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC),
 
?
 
?
5

How Secure is Code Generated by ChatGPT?:

, In: 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC),
 
?
6

A Modular Runtime Enforcement Model Using Multi-traces:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
7

Are Backdoor Mandates Ethical?—A Position Paper:

Khoury, Raphael ; Halle, Sylvain
IEEE Technology and Society Magazine.  41 (2022)  4 - p. 63-70 , 2022
 
?
8

TwinDroid : a dataset of Android app system call traces ..:

, In: Proceedings of the 19th International Conference on Mining Software Repositories,
 
?
9

TwinDroid: A Dataset of Android app System call traces and ..:

, In: 2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR),
 
?
10

A Taxonomy of Software Flaws Leading to Buffer Overflows:

, In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS),
Khoury, Raphael - p. 1-8 , 2022
 
?
11

Employing Feature Selection to Improve the Performance of I..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
 
?
14

Behavioral classification of Android applications using sys..:

, In: 2021 28th Asia-Pacific Software Engineering Conference (APSEC),
Razgallah, Asma ; Khoury, Raphael - p. 43-52 , 2021
 
1-15