Raphaël Khoury

691 total citations
33 papers, 316 citations indexed

About

Raphaël Khoury is a scholar working on Computer Networks and Communications, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Raphaël Khoury has authored 33 papers receiving a total of 316 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Computer Networks and Communications, 18 papers in Signal Processing and 13 papers in Artificial Intelligence. Recurrent topics in Raphaël Khoury's work include Advanced Malware Detection Techniques (17 papers), Network Security and Intrusion Detection (9 papers) and Security and Verification in Computing (9 papers). Raphaël Khoury is often cited by papers focused on Advanced Malware Detection Techniques (17 papers), Network Security and Intrusion Detection (9 papers) and Security and Verification in Computing (9 papers). Raphaël Khoury collaborates with scholars based in Canada, France and United States. Raphaël Khoury's co-authors include Sylvain Hallé, Anderson R. Avila, Abdelwahab Hamou‐Lhadj, Nadia Tawbi, Fábio Petrillo, Richard Khoury, Sébastien Gaboury, Syed Shariyar Murtaza, Ylìès Falcone and Ali Reza Mehrabian and has published in prestigious journals such as ACM Computing Surveys, Computer and Computers & Security.

In The Last Decade

Raphaël Khoury

30 papers receiving 302 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Raphaël Khoury Canada 9 184 181 134 120 52 33 316
Jingzheng Wu China 12 244 1.3× 177 1.0× 253 1.9× 251 2.1× 68 1.3× 39 498
Guy-Vincent Jourdan Canada 12 156 0.8× 153 0.8× 268 2.0× 134 1.1× 80 1.5× 63 439
Dimitar Dimitrov Switzerland 7 72 0.4× 121 0.7× 170 1.3× 106 0.9× 55 1.1× 18 288
Antoine Delignat-Lavaud United Kingdom 12 120 0.7× 178 1.0× 200 1.5× 288 2.4× 45 0.9× 18 406
Fausto Spoto Italy 12 179 1.0× 132 0.7× 220 1.6× 241 2.0× 129 2.5× 48 465
Scott A. Crosby United States 7 105 0.6× 308 1.7× 134 1.0× 243 2.0× 27 0.5× 10 452
Padmanabhan Krishnan Australia 9 74 0.4× 106 0.6× 140 1.0× 92 0.8× 127 2.4× 68 311
Heiko Mantel Germany 10 187 1.0× 145 0.8× 107 0.8× 284 2.4× 29 0.6× 42 338
Hong Jin Kang Singapore 13 99 0.5× 75 0.4× 237 1.8× 151 1.3× 135 2.6× 26 372
Van Nguyen Australia 10 115 0.6× 75 0.4× 239 1.8× 106 0.9× 159 3.1× 27 358

Countries citing papers authored by Raphaël Khoury

Since Specialization
Citations

This map shows the geographic impact of Raphaël Khoury's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Raphaël Khoury with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Raphaël Khoury more than expected).

Fields of papers citing papers by Raphaël Khoury

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Raphaël Khoury. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Raphaël Khoury. The network helps show where Raphaël Khoury may publish in the future.

Co-authorship network of co-authors of Raphaël Khoury

This figure shows the co-authorship network connecting the top 25 collaborators of Raphaël Khoury. A scholar is included among the top collaborators of Raphaël Khoury based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Raphaël Khoury. Raphaël Khoury is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Khoury, Raphaël, et al.. (2025). Assessing the Effectiveness of ChatGPT in Secure Code Development: A Systematic Literature Review. ACM Computing Surveys. 57(12). 1–32.
2.
Hallé, Sylvain, et al.. (2023). A modular pipeline for enforcement of security properties at runtime. Annals of Telecommunications. 78(7-8). 429–457. 1 indexed citations
3.
Khoury, Raphaël. (2022). A Taxonomy of Software Flaws Leading to Buffer Overflows. 1 indexed citations
4.
Khoury, Raphaël, et al.. (2022). TwinDroid. 591–595. 1 indexed citations
5.
Khoury, Raphaël, et al.. (2021). Use of Security Logs for Data Leak Detection: A Systematic Literature Review. Security and Communication Networks. 2021. 1–29. 7 indexed citations
6.
Khoury, Raphaël, et al.. (2021). Behavioral classification of Android applications using system calls. 43–52. 6 indexed citations
7.
Khoury, Raphaël, et al.. (2019). 10 Years of IoT Malware: A Feature-Based Taxonomy. 458–465. 42 indexed citations
8.
Khoury, Raphaël, et al.. (2019). Detecting trend deviations with generic stream processing patterns. Information Systems. 101. 101446–101446.
9.
Khoury, Raphaël, et al.. (2019). On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas. 116–117. 1 indexed citations
10.
Khoury, Raphaël, et al.. (2019). Predictive Analytics for Event Stream Processing. ws 16 1. 171–182. 4 indexed citations
11.
Hamou‐Lhadj, Abdelwahab, et al.. (2019). Empirical study of android repackaged applications. Empirical Software Engineering. 24(6). 3587–3629. 17 indexed citations
12.
Hallé, Sylvain & Raphaël Khoury. (2018). Event Stream Processing with BeepBeep 3. 3. 81–72. 6 indexed citations
13.
Hallé, Sylvain, et al.. (2018). Streamlining the Inclusion of Computer Experiments In a Research Paper. Computer. 51(11). 78–89. 10 indexed citations
14.
Khoury, Raphaël, et al.. (2018). Real-Time Data Mining for Event Streams. 16. 123–134. 4 indexed citations
15.
Khoury, Raphaël & Sylvain Hallé. (2018). Tally Keeping-LTL: An LTL Semantics for Quantitative Evaluation of LTL Specifications. 3. 495–502. 1 indexed citations
16.
Hallé, Sylvain & Raphaël Khoury. (2017). SealTest: a simple library for test sequence generation. 392–395. 3 indexed citations
17.
Khoury, Raphaël & Nadia Tawbi. (2015). Equivalence-preserving corrective enforcement of security properties. International Journal of Information and Computer Security. 7(2/3/4). 113–113. 2 indexed citations
18.
Khoury, Raphaël & Nadia Tawbi. (2012). Which security policies are enforceable by runtime monitors? A survey. Computer Science Review. 6(1). 27–45. 8 indexed citations
19.
Khoury, Raphaël & Nadia Tawbi. (2012). Corrective Enforcement. ACM Transactions on Information and System Security. 15(2). 1–27. 9 indexed citations
20.
Khoury, Raphaël, et al.. (2010). Extending the enforcement power of truncation monitors using static analysis. Computers & Security. 30(4). 194–207. 13 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026