Haider M. Al-Khateeb

Haider M. Al-Khateeb
University of Wolverhampton · School of Engineering, Computing and Mathematical Sciences

PhD BSc(Hons) PgCAP SFHEA CEH

About

56
Publications
28,700
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
440
Citations
Introduction
Dr Haider al-Khateeb holds a position as a Reader in Cybersecurity at the University of Wolverhampton. As a security researcher, Haider is actively engaged with the latest trends on Distributed Digital Forensics, Cyber Resilience, Cyber Threat Intelligence (CTI), and Online Safety for vulnerable groups.

Publications

Publications (56)
Article
Full-text available
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber-threats against such systems. In this paper, we introduce proactive anomaly detection to a use-case of...
Article
Full-text available
Connected cars have a massive impact on the automotive sector, and whilst this catalyst and disruptor technology introduce threats, it brings opportunities to address existing vehicle-related crimes such as carjacking. Connected cars are fitted with sensors, and capable of sophisticated computational processing which can be used to model and differ...
Chapter
Full-text available
Disability hate crime is under-reported in the UK with perceived limited support given to the victims. The use of online communication resulted in cyber-disability hate cases, recognised by the Police with the addition of an ‘online-flag’ in the documentation. However, the cases remain under-reported, with potential individual, societal and organis...
Article
Industrial Control Systems (ICS) are integral parts of smart cities and critical to modern societies. Despite indisputable opportunities introduced by disruptor technologies, they proliferate the cybersecurity threat landscape, which is increasingly more hostile. The quantum of sensors utilised by ICS aided by Artificial Intelligence (AI) enables d...
Article
Advanced cyber attackers often 'pivot' through several devices in such complex infrastructure to obfuscate their footprints and overcome connectivity restrictions. However, prior pivot attack detection strategies present concerning limitations. This paper addresses an improvement of cyber defence with APIVADS, a novel adaptive pivoting detection sc...
Article
Digital twin technologies – comprised of data-rich models and machine learning – allow the operators of smart city applications to gain an accurate representation of complex cyber-physical models. However, the implicit need for resilient data protection must be achieved by integrating privacy-preserving mechanisms into the DT system design as part...
Chapter
Cities are investing in smart technologies to improve efficiency, resilience against cyber attacks and quality of life for their residents. They provide enhanced services and can largely benefit the environment too. However, there are a variety of security implications during the transition towards a smart city. For example, anticipated risks have...
Chapter
The systematic integration of the Internet of Things (IoT) into the supply chain creates opportunities for automation in smart homes from concept to practice. Our research shows that residential burglary remains a problem. Despite the paradigm shift in ubiquitous computing, the maturity of the physical security controls integrating IoT in residenti...
Article
Modern network infrastructures host converged applications that demand rapid elasticity of services, increased security, and ultra-fast reaction times. The Tactile Internet promises to facilitate the delivery of these services while enabling new economies of scale for high fidelity of machine-to-machine and human-to-machine interactions. Unavoidabl...
Book
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as...
Article
Full-text available
By law, schools are required to protect the well-being of students against problems such as on-campus bullying and physical abuse. In the UK, a report by the Office for Education (OfE) showed 17% of young people had been bullied during 2017–2018. This problem continues to prevail with consequences including depression, anxiety, suicidal thoughts, a...
Chapter
Full-text available
Cybercrime has evolved rapidly in recent years since societies are becoming more reliant on digital communications with e-services inevitably replacing legacy systems. This has redefined our ecosystem to a highly interconnected Cyber-Physical-Natural (CPN) world where various aspects of our daily life including cybercrime are being realized online...
Article
Full-text available
The world is experiencing a rapid growth of smart cities accelerated by Industry 4.0, including the Internet of Things (IoT), and enhanced by the application of emerging innovative technologies which in turn create highly fragile and complex cyber–physical–natural ecosystems. This paper systematically identifies peer-reviewed literature and explici...
Chapter
Precision healthcare is an emerging concept that will see technology-driven digital transformation of the health service. It enables customised patient outcomes via the development of novel, targeted medical approaches with a focus on intelligent, data-centric smart healthcare models. Currently, precision healthcare is seen as a challenging model t...
Chapter
The rise of new digital economies and data-driven supply-chains seeks to revolutionalise the ways information is transferred, processed and analysed across different industry segments in the value-creation. This data-driven manufacturing revolution promises to increase productivity, democratise data sharing capabilities and foster industrial growth...
Chapter
Forensic age estimation is usually requested by courts, but applications can go beyond the legal requirement to enforce policies or offer age-sensitive services. Various biological features such as the face, bones, skeletal and dental structures can be utilised to estimate age. This article will cover how modern technology has developed to provide...
Article
Traditional centralized data storage and processing solutions manifest limitations with regards to overall operational cost and the security and auditability of data. One of the biggest issues with existing solutions is the difficulty of keeping track of who has had access to the data and how the data may have changed over its lifetime; while provi...
Article
Current authentication protocols seek to establish authenticated sessions over insecure channels while maintaining a small footprint considering the energy consumption and computational overheads. Traditional authentication schemes must store a form of authentication data on the devices, putting this data at risk. Approaches based on purely public/...
Chapter
Distributed Ledger Technologies are promised to be genuinely disruptive in a variety of industries and sectors, from the food supply, pharmaceutical, real estate, financial services, academia and healthcare. Blockchain technologies vastly improve the flow of data within and among companies and people and transform the way that the Internet is used...
Chapter
Blockchain technology can be incorporated into new systems to facilitate modern Digital Forensics and Incident Response (DFIR). For example, it is widely acknowledged that the Internet-of-Things (IoT) has introduced complexity to the cyberspace, however, incident responders should also realise the advantages presented by these new “Digital Witnesse...
Article
Full-text available
Industrial Control Systems (ICSs) are responsible for the automation of different processes and the overall control of systems that include highly sensitive potential targets such as nuclear facilities, energy-distribution, water-supply, and mass-transit systems. Given the increased complexity and rapid evolvement of their threat landscape, and the...
Chapter
The rise of interconnected “intelligent” objects that move their capabilities from sensing and data processing to decision making will be a disruptive phenomenon that further widens the gaps between legal, regulatory and technological approaches. This research sets out to establish a guided road map through the maze of regulation by incorporating t...
Chapter
Full-text available
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorporating the most important features of the wireless channel in vehicle-to-vehicle (V2V) communication. The proposed model includes surrounding scatterers’ mobility by considering other vehicles; it also includes three-dimensional (3D) multipath propaga...
Chapter
Full-text available
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorporating the most important features of the wireless channel in vehicle-to-vehicle (V2V) communication. Non-reciprocity compensation is combined with turbo codes (TCs) for error reconciliation purposes. For fair comparisons, the indexing technique is ap...
Book
This book aims to highlight the gaps and the transparency issues in the clinical research and trials processes and how there is a lack of information flowing back to researchers and patients involved in those trials. Lack of data transparency is an underlying theme within the clinical research world and causes issues of corruption, fraud, errors a...
Chapter
Research shows that people with long term conditions and disabilities are frequently labelled as vulnerable, and commonly victimised online. They require instrumental support to understand their conditions and empower them to manage their own treatment in everyday life. However, additional short and long term consequences related to cyber-victimisa...
Chapter
Full-text available
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it giv...
Article
Physical layer security protocols have recently been deployed in the context of Wireless communications. These are derived from the intrinsic characteristics of the communication media for key generation, sharing and randomness extraction. These protocols always seek to exhibit both low computational complexity and energy efficiency, whilst also ma...
Conference Paper
Abstract—Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks (MANETs). These networks promise to increase road safety and improve the driving experience by exploiting recent advances in wireless technologies for both intra-vehicle and inter-vehicle communications. Physical layer security is a promisin...
Article
Full-text available
The succeeding code for metamorphic malware is routinely rewritten to remain stealthy and undetected within infected environments. This characteristic is maintained by means of encryption and decryption methods, obfuscation through garbage code insertion, code transformation and registry modification which makes detection very challenging. The main...
Conference Paper
Abstract. We present an algorithm that allows two users to establish a symmetric cryptographic key by incorporating the most important features of the wireless channel in vehicle-to-vehicle (V2V) communication. Non-reciprocity compensa-tion is combined with turbo codes (TCs) for error reconciliation purposes. For fair comparisons, the indexing tech...
Article
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in a physical-layer key agreement scheme, non-reciprocity due to inherent channel noise and hardware impairments can propagate bit disagreements. This has to be addressed...
Article
Full-text available
Context: Online harassment and stalking have been identified with growing accordance as anti-social behaviours, potentially with extreme consequences including indirect or direct physical injury, emotional distress and/or financial loss. Objective: As part of our ongoing work to research and establish better understanding of cyberstalking, this stu...
Conference Paper
With the wide spread of Internet applications in both the surface net (Internet) and Darknet, the necessity to safeguard privacy and anonymity has become more prominent than ever. In an attempt to assure untraceability and undetectability between entities, as part of the communication process, traditional confidentiality mechanisms have proved insu...
Article
Full-text available
Disabled people face hostility and harassment in their socio-cultural environment. The use of electronic communications creates an online context that further reshapes this discrimination. We explored the experiences of 19 disabled victims of cyberharassment. Five themes emerged from the study: disability and health consequences, family involvement...
Conference Paper
Full-text available
Recent research on Big Data proposed and evaluated a number of advanced techniques to gain meaningful information from the complex and large volume of data available on the World Wide Web. To achieve accurate text analysis, a process is usually initiated with a Text Classification (TC) method. Reviewing the very recent literature in this area shows...
Article
Full-text available
Cyber security has become a major concern for users and businesses alike. Cyberstalking and harassment have been identified as a growing anti-social problem. Besides detecting cyberstalking and harassment, there is the need to gather digital evidence, often by the victim. To this end, we provide an overview of and discuss relevant technological mea...
Article
It is well known that government agencies have had the capability to eavesdrop on public switched telephone networks for many decades.1 However, with the growing use of the Internet and the increasing technical capabilities of agencies to conduct mass surveillance, an individual's right to privacy is of far greater concern in recent years. The ethi...
Article
Full-text available
Web browsers are essential tools for accessing the internet. Extra complexities are added to forensic investigations when recovering browsing artefacts as portable and private browsing are now common and available in popular web browsers. Browsers claim that whilst operating in private mode, no data is stored on the system. This paper investigates...
Article
Full-text available
With the virtual world becoming part of the social lives of adults and minors alike, new attack vectors emerged to increase the severity of human-related attacks to a level the community have not experience before. This article investigates and shares an outline on how technology could emerge further to counteract and mitigate the damage caused by...
Conference Paper
Full-text available
The proliferation and popularity of smart autonomous systems necessitates the development of methods and models for ensuring the effective identification of their owners and controllers. The aim of this paper is to critically discuss the responsibility of Things and their impact on human affairs. This starts with an in-depth analysis of IoT Charact...
Chapter
Full-text available
The idea of this chapter is give the reader an idea of what is meant by social engineering and what can be done about this type of ‘attack’. In essence, social engineering is an umbrella term which here encompasses those acts perpetrated through lying, manipulation, persuasion, impersonation, misdirection and deceitfulness in order to gain the soci...
Chapter
Full-text available
Security specialists tend to advice that you install security tools and adapt to a list of safe-use guidelines to protect your personal devices, this is especially important when you are targeted, such as in the case of cyberstalking. Typical questions you might still ask include: how can I select a good security product for my device? Do I need an...
Book
To create fear, distress and to disrupt the daily activities of another person through cyberstalking is a crime, if you are currently affected by cyberstalking, it is crucial that you alert the police to your situation to keep yourself safe. This practical guide offers an outline of the area of cyberstalking and cyber abuse. Written in an approacha...
Chapter
Full-text available
In a modern ecosystem, your experience in the natural world is highly affected by technology with the cyber space forming an inevitable part of it. This has introduced a whole new range of digital devices and communication channels to your life, some of these are very useful that you probably cannot imagine your daily activities without using them;...
Conference Paper
Full-text available
Text passwords are vulnerable to many security attacks due to a number of reasons such as the insecure practices of end users who select weak passwords to maintain their long term memory. As such, visual password (VP) solutions were developed to maintain the security and usability of user authentication in collaborative systems. This paper focuses...
Conference Paper
Full-text available
Security and usability are key elements in system design. A bad design might result in unnecessary inverse proportion between the two, while a good design must find a balance to achieve usable security. In this paper we present and discuss the results of a user study to show how good application of click-based systems can produce a system people ca...
Conference Paper
A variety of visual passwords approaches were proposed that aim to replace conventional text passwords. The main advantage of both systems is that unlike biometrics and tokens they do not require special hardware. However they still fail to provide a satisfying solution to the usability problems of today’s authentication systems. Both text and visu...

Network

Cited By

Projects

Projects (3)
Project
We investigate how in-car sensor generated driving data reflecting individual drivers, how it can contribute to better understanding drivers’ behaviour, identify drivers and driver groups to help mitigate cybersecurity threats in connected cars.