
Hamid Jahankhani- BSc, MSc, PhD
- Professor at Northumbria University London Campus
Hamid Jahankhani
- BSc, MSc, PhD
- Professor at Northumbria University London Campus
About
265
Publications
199,407
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,003
Citations
Current institution
Northumbria University London Campus
Current position
- Professor
Publications
Publications (265)
Geopolitical situations, such as the Ukraine–Russia war, the Israel–Hamas war, and pandemics, can disrupt supply chains, such as the rerouting of oil tankers via South Africa to avoid the impact of the Israel–Hamas conflict. These events will probably occur again, but they are black swan events and difficult to predict. How can firms manage these e...
The User Datagram Protocol (UDP) is widely used in low-latency applications such as IoT, real-time systems, and streaming services due to its connectionless nature and minimal overhead. However, its stateless design introduces significant security vulnerabilities that traditional mechanisms like Datagram Transport Layer Security (DTLS) fail to addr...
Agentic AI systems—such as AI-powered autonomous financial advisors that can initiate transactions, or robotic process agents capable of managing supply chain operations end-to-end—represent a powerful new generation of artificial intelligence. These systems are designed to pursue complex goals independently, with minimal or no ongoing human oversi...
This paper proposes a novel machine learning-based approach to solve the resource allocation problem in 5G Open Radio Access Networks (O-RAN). While traditional methods rely on meta-heuristic optimization techniques such as Whale Optimization Algorithm (WOA), we present an ensemble learning framework that combines multiple advanced algorithms to ac...
In today’s healthcare landscape, the demand for exchanging healthcare data across borders is escalating, but it comes with significant challenges such as privacy and regulatory compliance. The integration of Self-Sovereign Identity (SSI) with blockchain technology emerges as a promising solution. This research evaluates the significance of the SSI-...
The emergence of quantum computing presents a significant challenge to the security of mission-critical applications such as satellite communications, business-to-business interactions, and critical infrastructure. As quantum computers have the potential to compromise current encryp-tion algorithms, there is an urgent need for robust, quantum-resis...
In the era of generative AI, big data analytics, Business Analytics, and mega global digital corporations; the profession of marketing is at a crossroads between 'Prosumer-Marketing' and 'Market Grooming'. Whereas Prosumer (Producers + consumers) marketing means a process of exchange in which producers and consumers have equal, just, control, volun...
The concept of 'intelligence' used to differ between human and machines, until the disruption of artificial intelligence (AI). The field of AI is advancing far more rapidly than the establishment of rules and regulations, which is causing certain fear. However, slowing down this progression to avoid economic crisis is not an option because of open-...
The document provides a comprehensive framework for ensuring the safety of agentic AI systems, which are AI models capable of autonomous decision-making and goal pursuit. It defines agentic AI, highlights its benefits and risks, and outlines principles for safer development and governance. The guidelines employ a Weighted Factors Methodology to bal...
The field of Quantum Reinforcement Learning (QRL) has gained much attention in recent years within the domain of artificial intelligence (AI) and machine learning (ML). With the widespread acceptance of AI agents across diverse industries, it is imperative to augment their potential, effectiveness, and flexibility. Quantum Reinforcement Learning (Q...
This research delves extensively into deepfake technology's substantial influence on cybersecurity, revealing its subtle aspects and potential social repercussions. The investigation begins with deciphering the practical process for generating deepfakes using DeepFace Lab, providing light on every tedious step from data extraction to model training...
This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the po...
Satellites have advanced from scientific wonders to vital components of our daily lives in modern society. These defined “artificial objects” provide worldwide communication, accurate navigation, Earth observation, national security and many more crucial services in our interconnected world. However, as our reliance on satellite technology grows, s...
Space mining is a pioneering concept that involves extracting valuable resources from celestial bodies, such as asteroids, moons, and planets. This innovative approach holds immense potential for addressing earth resource shortages and supporting future space exploration endeavours. As humanity looks beyond our planet for sustainable solutions, spa...
Ground-based satellite operations play a pivotal role in ensuring the seamless functioning of satellites orbiting our planet. These operations, however, are not immune to the ever-evolving landscape of cybersecurity risks and threats with the rise of quantum computing. The integrity, confidentiality, and availability of critical satellite data and...
Recently, there has been a notable surge in the intricate complexities of global supply chain management (SCM), which is gaining researchers’ attention. Supply chain sustainability is put at risk by security issues in blockchain technology that affect everything from infrastructure to management. For sustainable supply chain management (SSCM), thes...
Quantum computing is a disruptive technology that has the potential to revolutionize fields such as quantum physics, biology, economics, and cybersecurity. The impacts of quantum computing go beyond scientific research into the daily lives of ordinary people, not only because of its pros but also because it poses serious threats for modern telecomm...
According to the PCI Security Standards Council, ensuring compliance with the Payment Card Industry Data Security Standard is essential for protecting sensitive cardholder data (Elluri et al. in An integrated knowledge graph to automate GDPR and PCI DSS compliance. IEEE, Seattle, WA, pp. 1266–1271, 2018 [1]). Maintaining PCI DSS compliance poses ad...
In the modern age of technology, the term cloud computing is getting hype day by day. Cloud computing platform works based on on-demand services on the Internet due to the virtualization environment. The basic feature of this technology is that it provides pay as you use the model in which users are free to invest in the heavy cost of infrastructur...
Geopolitical situations, such as the Ukraine–Russia war, the Israel–Hamas war, and pandemics, can disrupt supply chains, such as the rerouting of oil tankers via South Africa to avoid the impact of the Israel–Hamas conflict. These events will probably occur again, but they are black swan events and difficult to predict. How can firms manage these e...
Information security remains a significant concern for virtually every well-established organization globally. Extensive research indicates that a significant proportion of information security breaches can be attributed to internal employees’ disregard for information security policies. Non-compliance with these policies is a complex issue that ne...
Attacks using ransomware are increasing, putting current healthcare institutions and other crucial infrastructure at risk. The current healthcare administration systems could be a soft target, as evidenced by cyberattacks such as WannaCry incident in 2017, that affected just over one third of NHS trusts PCs and over 250,000 workstations in the majo...
Zimbabwe is home to an expansive ore reserve estimated at 13 million metric tonnes. Despite its long mining history spanning a century, only 580 metric tonnes have been extracted, indicating a massive reservoir of untapped potential [Goosen M (2023) Top 5 minerals produced in Zimbabwe. Energy Capital Power]. However, this potential is hindered by s...
The mounting prevalence of quantum computing poses a threat not only to conventional but also to futuristic network systems. As a result, today the focus shifts towards strengthening existing networks to secure sensitive data that may be threatened as a result of the potential for breaking present encryption protocols with the introduction of quant...
Information and communication technology and social media are creating awareness and new stories about the role of technologies in creating sustainable cities, energy-efficient cities, smart cities, smart communities, green rooms and so on. Is there is any real potential, or it is a conflict of interest- ‘technology claims that technology the best...
The importance of software-level communication security in ICS is growing as these systems become more automated and connected to the outside world. This chapter provides a secure-by-design approach to ICS application development, where design-time abstractions known as secure links are used to meet criteria from security protocols like ISA/IEC 624...
The proliferation of technology is now exponential. Developments in technology, the increase in computer power and the reduction of cost, has allowed for greater accessibility, use and implementation of this technology in all sectors and industries. The evolution of smart and autonomous technologies, such as artificial intelligence and machine lear...
The phenomenon of counterfeiting continues to grow steadily. According to Global Brand Counterfeiting (GBC in The Global Brand Counterfeiting Report, 2018), the volume of international trade in counterfeit goods reached 1.097 trillion euros in 2017 and will exceed 1.65 trillion euros in 2020. To minimize this growing trend, the following project un...
The global pandemic forced many education establishments around the world to move to remotely learning. Criminals, have taken this opportunity to target vulnerable education institutions and carry out State-of-the-Art Cyber Attacks, exploiting flaws in their security systems by using social engineering methods and carrying out sophisticated high-pr...
The world of Higher Education has become ever more complex with the expansion of global supply chains with numerous connected organisations, technological advancements, the recent demands of educational hybrid learning, and the growing importance attached to individuals’ data and its security. In many ways the pandemic has accelerated the acceptanc...
A variety of businesses, academic institutions, and individual consumers have shown an interest in cloud computing since its inception in the last few years. This is due to the fact that cloud computing users are in a brand-new IT business paradigm. It holds the potential of moving away from a paradigm where businesses have to spend extensively on...
A higher education system needs to ensure its teaching process and materials are aligned with the graduate employment market needs and expectations. If a university has built trust in the industry, it would be more likely to have its graduates to find suitable relevant jobs in the market. As a result, this will have positive feedback to absorb bett...
The mining sector is worth trillions globally and the cornerstone of many developing nations wealth. National and corporate interests sit at the heart of negotiating fair value when pursuing profit while at the same time attempting to balance equality and sustainability of the sector. While the mining sector is of significant value to the economy,...
Digital twin technology is used to enable businesses to create efficiencies by modelling their physical counterparts. Use cases include modelling a physical device through its lifecycle to perform predictive maintenance, product training, future product development, product performance enhancement, or using the digital twin to control its physical...
Cyber security remains a relevant topic for organisations. While companies invest in expensive security tools security awareness training often is neglected, even though human error still accounts for a large part of cyber incidents (Gartner, 2022). At the same time there is currently an important generational shift, as Generation Z (Gen Z) is star...
The world is progressing further into the digital era, and as a result, more and more people are getting their initial information from online news portals and social media platforms. The dependence on sources of information that are becoming murkier raises the likelihood of being deceived and the possibility of misguided agendas. When it comes to...
This research presents the collection of data from different cybersecurity methodologies used for securing IoT environments, of which a few were chosen for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardenin...
As the size of the population is growing and the capacity of the planet earth is limited, human beings are searching for sustainable and technology-enabled solutions to support society, ecology, and the economy. One of the solutions has been developing smart sustainable cities. Smart sustainable cities are cities as systems, where their infrastruct...
Over recent years, technology has rapidly advanced and is accelerating the emergence to Industry 4.0, particularly due to the connectivity abundance, volume increase of smart devices, and a growing interconnectivity between humans and technology. Within the last two years, 90% of the data in the world today was generated and in the next few years t...
The purpose of business is to deliver customer value and innovate. The net customer value for a business is the difference between demand-side revenue streams and Supply side-cost streams, Most of the technopreneurs have improved their Business Models by improving efficiencies on the demand side as well as supply-side and deliver better customer va...
MiTM attack aims to violate data in transmission through the air medium in a wireless network; MITM exploits compromise data confidentiality and integrity and are conceivably the most productive types of cyberattacks utilised today. The increasing use of personal devices like smartphones connecting to the internet via Wi-Fi has made wireless attack...
Cyberattacks have become a nightmare for businesses, often having to spend time and resources identifying one or mitigating another. The current research is an effort to develop an artificial intelligence-based security solution that can meet the SME demands of providing a security solution capable of detecting cyberattacks in real-time before they...
Over the past decade, digitalization has played a greater role in improving the business stature of small business by opening new venues, extending their reach, and thereby improving value producing opportunities. It also brought the small businesses additional responsibilities of having to deal with the security risks and threats which are ever-pr...
The exponential growth of Autonomous Intelligent Malware (AIM) has really changed the landscape in the cyber security fight against that attack of auto generated threats and how these threats needs to be dealt with. This research focuses on the use of Artificial Intelligence (AI), Machine learning (ML) and Deep learning (DL) to mitigate auto-genera...
The exponential growth and advancements of information technology and artificial intelligence significantly enhance the capabilities of virtual agents. This creates opportunities for businesses such as banks to adapt virtual agents for banking operations. Security and privacy are the ultimate concern for any e-banking system or application. Therefo...
The SARS-CoV-2 (Severe acute respiratory syndrome coronavirus 2) universally and commonly known as COVIT-19 and the across-the-board lockdown measures are having complex and unforeseen effects on intricate social domains, which includes opportunities for offline and online crimes. For some months since March 2020, most countries in the world if not...
Malware is a huge category of software, generally designed with malicious intent. It has gained much attention in the media over last decade with a number of high-profile ransomware cases coming to light. Malware is often used as part of a kill chain in Advanced Persistent Threats (APTs) attacks. It can easily be developed using tools such as “Veil...
Cybersecurity is a broad and active field of research, and one of the biggest and most prevalent risks in the area is malicious behaviour. One strategy involves intrusion detection, which is often a dynamic approach to address any suspicious behaviours or anomalies that have been observed. Another approach would proactively anticipate these malicio...
With rapid advances in industrialisation and informalisation methodologies being attributed to industry 4.0, there is no surprise that Education 4.0 would want to harness those capabilities for its own use. Immersive ecosystems for teaching, utilising the benefits brought by augmented and virtual reality, offer a new horizon in learning, but also u...
In December 2019, the world witnessed the start of a pandemic outbreak (Coronavirus or COVID-19) in Wuhan the capital of China’s Hubei province and from there quickly spread globally. The uncertainty and fear change represented a golden opportunity for threat actors. Early 2020 research discovered widespread evidence that threat actors embraced the...
With the increased use of new technology in everyday applications, such as Artificial Intelligence, users rely on technology to guide them. What if a system that is trusted without a doubt can be manipulated and there are no warnings or detections? Even though users are being made aware of misinformation within social media and news outlets, we att...
Human trafficking is a crime that has devastating impacts on all societies worldwide. Law enforcement and security organisations often encounter many obstacles in their endeavours to combat this crime. Effective measures to tackle human trafficking necessitate the fusion of a wide range of factors which together could produce the desired impact. On...
Over the last decade, a noticeable growth in cyber-attacks has been recorded, pushing experts and specialists in cyber security for more advanced and sophisticated countermeasures to curb the spread of cyber-attacks. What needs to be addressed is the speed of which cybercrime is growing in the areas of critical national infrastructure; these can pr...
Connected cars have a massive impact on the automotive sector, and whilst this catalyst and disruptor technology introduce threats, it brings opportunities to address existing vehicle-related crimes such as carjacking. Connected cars are fitted with sensors, and capable of sophisticated computational processing which can be used to model and differ...
Human trafficking is a complex, burgeoning crime with a global foothold that impacts an estimated 40.3 million people worldwide. Currently, the number and the scale of innovation and technology tools do not correspond with the magnitude of the problem. There is little awareness about existing digital innovations and technology initiatives within th...
The UK is keen to be part of the Global Space market that has seen the recent activities of Virgin Galactic and SpaceX. This research will take into consideration the UKs operability parameters in relation to International Space agreements to investigate whether the Governance surrounding Satellite communications prepares for the new Spaceports tha...
The chapter focuses on building a theoretical network, which supports the protection of home networks from critical cyberattacks. A framework is proposed which aims to augment a home router with machine learning techniques to identify threats. During the current pandemic, employees have been working from home. So it is reasonable to expect that cyb...
This paper discusses the need for measuring ethics for organisations that use and develop artificially intelligent software. The primary objective for this paper is to bridge the gap between artificial intelligence and ethics through the development of an ethical maturity framework that can be globally adopted and implemented through the design sta...
Disability hate crime is under-reported in the UK with perceived limited support given to the victims. The use of online communication resulted in cyber-disability hate cases, recognised by the Police with the addition of an ‘online-flag’ in the documentation. However, the cases remain under-reported, with potential individual, societal and organis...
Despite its many technological and economic benefits, Cloud Computing poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. By characterising th...
The desire for eHealth systems is ever-growing as public institutions, healthcare providers, and its users see the positive gains from having systems of patient health information held in a single place; a decentralized connected architecture called blockchain. This concept can solve the interoperability issues and integrate the fragmented way heal...
Mixed reality—the hybrid state that merges data with real life—is on the cusp of becoming mainstream, with technology pushing the boundaries of what the human mind can easily comprehend. This chapter is a review of the mixed reality landscape and use cases, giving examples of current/future attack mechanisms which could be leveraged against consume...
The role of project management is changing dramatically in the backdrop of Industry 4.0 and the digital revolution. This exciting transformation is taking place in the next few years whilst embracing artificial intelligence (AI) technology into the body of the knowledge competencies. With this intelligence explosion, the influence of AI technology...
The digital witness concept is underpinned by the Internet of Things (IoT) which brings serious privacy challenges and concerns. Digital witnesses deliver digital evidence to authorised entities by means of a digital chain of custody. This chapter provides an alternative approach by giving users behind the digital witness, the ability to disclose o...
Recent global trends have led to the commodification of personal data, whilst the vast majority of users remain unaware or uninformed of the consequences of data mining and impacts of personal data exposure. This process has undeniably had a detrimental impact on the lives and privacy of users on a global scale, and whilst awareness of these concer...
The aim of this chapter is to explore the role of digitisation and artificial intelligence (AI) on social media and in aiding brand awareness marketing—an approach to create, communicate, and deliver value offerings to customers. It proposes that consumers are ready for a new journey in which AI is a tool for endless options and information that ar...
There are global discussions recognising the need for more development aid with jurisdictions such as the EU unveiling increased foreign aid budget for 2021–27 to deliver large increase in aid spending and eliminating the bureaucratic barriers. However, this increased flexibility gives rise to growing concerns on where aid is sent and that whole ch...
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text...
The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technol...
In the current, fast paced development of computer hardware, hardware manufacturers often focus on an expedited time to market paradigm or on maximum throughput. This inevitably leads to a number of unintentional hardware vulnerabilities. These vulnerabilities can be exploited to launch devastating hardware attacks and as a result compromise the pr...
In recent years, e-mails have become the most commonly used information and communication technology in organization. The email technology is susceptible to phishing attacks. Phishing attacks are a trending cybercrime activity and have caused a lot of financial loss using social engineered communication that are transmitted to individuals by cyberc...
In light of the industry 4 evolution, the concerns regarding the data privacy seemed to rise due to the vast platforms and the adverse impacts that its data protection policies can have on people using it. In 2018, the European Union imposed a regulation called the general data privacy regulation (GDPR). The regulations aimed towards the protection...
Phishing is an identity theft evasion strategy used in which consumers accept bogus emails from fraudulent accounts that claim to belong to a legal and real company in the effort to steal sensitive information of the client. This act places many users’ privacy at risk, and therefore researchers continue to work on identifying and improving current...
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as...
The traditional intrusion detection and Intrusion prevention systems are known as “signature based”, which means that they function in a similar method to a virus scanner by identifying the similar signatures for each intrusion event it detects. This specific method is very effective if the attacks are known, but for zero day attack it will not be...
Malicious behaviour analysis is one of the biggest and most prevalent challenges in cybersecurity. With the dominance of the Android ecosystem, a significant number of frameworks were proposed to address the huge number of malicious attacks targeting the consumer base of this platform. Although still developing, the application of machine learning...
The book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals. In recent years, AI has gained substantial attention from researchers in both academia and industry, and as a result AI’s capabilities are constantly increasing at an extraordinary pace. AI is considered to be the Fo...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This i...
Without sufficient intelligence, police response to crimes occurs in the form a reactive retort. This is even more so in the case of cyberspace policing, as digital platforms increase the complexities involved in the overall police incident response development. In this paper, we briefly introduce cybercrime and the necessities that police forces h...
The governance and supply chain of organs is a complicated process throughout the life cycle; from the outset of pre-assessment of organ placement, it's supply chain journey and important post donor analysis. Healthcare organisations face a huge challenge in the diverse collation of data that are held in systems which are mostly in silo operation a...
The old adage, “seeing is believing”, no longer holds true in modern society. Digital media has paved the way for anyone to doctor images and for videos to misrepresent truth. The lines between fact, entertainment, advertising, fabrication and fiction are becoming increasingly blurred as what is termed ‘fake news’ increases in modern day society. A...
IoT devices are becoming more prevalent in society, with an expected 21.5 Billion devices connected by 2025 [24], and when an incident occurs in the vicinity of such devices then they should be considered as potential digital evidence. A network of IoT devices is often referred to as a smart environment, or more frequently as a cyber physical syste...
The governance and supply chain of organs is a complicated process throughout the life cycle; from the outset of pre-assessment of organ placement, it’s supply chain journey and important post donor analysis. Healthcare organisations face a huge challenge in the diverse collation of data that are held in systems which are mostly in silo operation a...
This chapter centres on the emergence of technology in cases of Domestic Abuse using two adjunct parts; (1) how digital coercive control using smart home devices is now an attack vector for abusers and (2) it sets out to highlight the use of a governance model incorporating a risk-based approach following the principles of the Cyber Security Maturi...
Advanced Persistent Threats (APTs) are destructive and malicious cyberattacks aimed at high profile, high value targets with clear objectives in mind with a range of desired outputs. In most cases, these threat groups are state sponsored which makes them extremely well financed, organised and resourced. The attack payloads range from data exfiltrat...
The Internet of Things (IoT) are being enthusiastically adopted by consumers. By the year 2020 the sum of 31 billon IoT devices will be deployed globally. Subsequent as the IoT device landscape is expanding at such speed, so does the threat landscape and vulnerabilities it introduces increases. Thus, making IoT devices easily prone to attacks or to...
This chapter centres on the emergence of technology in cases of Domestic Abuse using two adjunct parts; (a) how digital coercive control using smart home devices is now an attack vector for abusers and (b) it sets out to answer if the UK Domestic Abuse bill is adequate to support victims of technology facilitated abuse.
The huge increase in data usage and the rapid development of new technologies such as cloud, IoT, and has also led to the exponential increase in cyber threats online. Anonymity and privacy services have equally seen an exceptional growth rate since the introduction of Blockchain and Tor network, as more individuals demand anonymous services away f...
Blockchain and decentralised distributed ledger technologies are being viewed as a mechanism to provide further protection and enhance the security of data by using its properties of immutability, auditability and encryption whilst providing transparency amongst parties who may not know each other; so, operating in a trustless environment. It’s tru...
With the development of automated and AI technology permeating into all sectors of public, private and industry life, the interconnectivity of once remote, siloed and air gapped systems is on the increase. Whilst this affords productive, streamlined and efficient ways of working, monitoring and maximise the effectivity of these systems, it is the c...
5G, the fifth generation of wireless connectivity, is designed to allow long-distance coverage and stable connections as well as rapid data download and upload. As a result of 5G’s the wireless-based technology, the data migration enables a speed of 20 Gbps (Gigabyte per second) through wireless mobile data connections, which simplifies the managem...
The speed and proliferation of AI and algorithmic technology has far outpaced that of the development of the legislative frameworks to which to govern them, to ensure their appropriate, safe and permissive use. It is not suggested that the development of these technologies and integrations are thwarted or inhibited, but more that there is a holisti...