Haider M. Al-Khateeb

Orcid: 0000-0001-8944-123X

Affiliations:
  • University of Wolverhampton, School of Mathematics and Computer Science, UK
  • University of Bedfordshire, UK


According to our database1, Haider M. Al-Khateeb authored at least 30 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Self-Healing in Cyber-Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools.
Future Internet, July, 2023

Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey.
IEEE Trans. Engineering Management, 2023

Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks.
Algorithms, 2023

Does Artificial Intelligence Help Reduce Audit Risks?
Proceedings of the 13th International Conference on Advanced Computer Information Technologies, 2023

2022
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-enhancing technologies in the design of digital twins for smart cities.
Netw. Secur., 2022

Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems.
IEEE Internet Things J., 2022

Blockchain technologies in the design of Industrial Control Systems for Smart Cities.
CoRR, 2022

2021
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021

Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study.
J. Sens. Actuator Networks, 2021

Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data.
Comput. Electr. Eng., 2021

2020
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security.
IEEE Trans. Engineering Management, 2020

Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security".
IEEE Trans. Engineering Management, 2020

2019
Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems.
J. Sens. Actuator Networks, 2019

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019

AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Investigating Data Exfiltration in DNS Over HTTPS Queries.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2018
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet Things J., 2018

Effective methods to detect metamorphic malware: a systematic review.
Int. J. Electron. Secur. Digit. Forensics, 2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence.
CoRR, 2018

Physical characteristics of wireless communication channels for secret key establishment: A survey of the research.
Comput. Secur., 2018

Quantisation feasibility and performance of RSS-based secret key extraction in VANETs.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility.
Telematics Informatics, 2017

2016
Anonymity networks and the fragile cyber ecosystem.
Netw. Secur., 2016

Web browser artefacts in private and portable modes: a forensic investigation.
Int. J. Electron. Secur. Digit. Forensics, 2016

On Textual Analysis and Machine Learning for Cyberstalking Detection.
Datenbank-Spektrum, 2016

Arabic text classification methods: Systematic literature review of primary studies.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

2011
Security and usability in click-based authentication systems.
PhD thesis, 2011


  Loading...