Haider M. al-Khateeb
Cited by
Cited by
On textual analysis and machine learning for cyberstalking detection
I Frommholz, HM Al-Khateeb, M Potthast, Z Ghasem, M Shukla, E Short
Datenbank-Spektrum 16 (2), 127-135, 2016
Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks
G Epiphaniou, P Karadimas, DKB Ismail, H Al-Khateeb, A Dehghantanha, ...
IEEE Internet of Things Journal 5 (4), 2496-2505, 2017
How technology can mitigate and counteract cyber-stalking and online grooming
HM al-Khateeb, G Epiphaniou
Computer Fraud & Security 2016 (1), 14-18, 2016
‘The language is disgusting and they refer to my disability’: the cyberharassment of disabled people
ZA Alhaboby, HM al-Khateeb, J Barnes, E Short
Disability & Society 31 (8), 1138-1143, 2016
Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility
HM Al-Khateeb, G Epiphaniou, ZA Alhaboby, J Barnes, E Short
Telematics and Informatics 34 (4), 339-349, 2017
Arabic text classification methods: Systematic literature review of primary studies
W Alabbas, HM Al-Khateeb, A Mansour
2016 4th IEEE International Colloquium on Information Science and Technology …, 2016
Proactive threat detection for connected cars using recursive Bayesian estimation
H Al-Khateeb, G Epiphaniou, A Reviczky, P Karadimas, H Heidari
IEEE Sensors Journal 18 (12), 4822-4831, 2017
Blockchain for modern digital forensics: The chain-of-custody as a distributed ledger
H Al-Khateeb, G Epiphaniou, H Daly
Blockchain and Clinical Trial, 149-168, 2019
Non-interactive zero knowledge proofs for the authentication of iot devices in reduced connectivity environments
M Walshe, G Epiphaniou, H Al-Khateeb, M Hammoudeh, V Katos, ...
Ad Hoc Networks 95, 101988, 2019
Anonymity networks and the fragile cyber ecosystem
H Haughey, G Epiphaniou, HM Al-Khateeb
Network Security 2016 (3), 10-18, 2016
Classification of colloquial Arabic tweets in real-time to detect high-risk floods
W Alabbas, HM al-Khateeb, A Mansour, G Epiphaniou, I Frommholz
2017 International Conference On Social Media, Wearable And Web Analytics …, 2017
Responsibility and Non-repudiation in resource-constrained Internet of Things scenarios
E Oriwoh, H al-Khateeb, M Conrad
International Conference on Computing and Technology Innovation (CTI 2015), 2016
Preliminaries of orthogonal layered defence using functional and assurance controls in industrial control systems
M Mackintosh, G Epiphaniou, H Al-Khateeb, K Burnham, P Pillai, ...
Journal of Sensor and Actuator Networks 8 (1), 14, 2019
Effective methods to detect metamorphic malware: a systematic review
M Irshad, HM Al-Khateeb, A Mansour, M Ashawa, M Hamisu
International Journal of Electronic Security and Digital Forensics 10 (2 …, 2018
Web browser artefacts in private and portable modes: a forensic investigation
C Flowers, A Mansour, HM Al-Khateeb
International Journal of Electronic Security and Digital Forensics 8 (2), 99-117, 2016
Federated blockchain-based tracking and liability attribution framework for employees and cyber-physical objects in a smart workplace
G Ahmadi-Assalemi, HM Al-Khateeb, G Epiphaniou, J Cosson, ...
2019 IEEE 12th International Conference on Global Security, Safety and …, 2019
Blockchain and healthcare
G Epiphaniou, H Daly, H Al-Khateeb
Blockchain and Clinical Trial, 1-29, 2019
Physical characteristics of wireless communication channels for secret key establishment: a survey of the research
M Bottarelli, G Epiphaniou, DKB Ismail, P Karadimas, H Al-Khateeb
Computers & Security 78, 454-476, 2018
Adaptive traffic fingerprinting for darknet threat intelligence
H Haughey, G Epiphaniou, H Al-Khateeb, A Dehghantanha
Cyber Threat Intelligence, 193-217, 2018
A practical guide to coping with cyberstalking
H al-Khateeb, ZA Alhaboby, J Barnes, A Brown, R Brown, P Cobley, ...
Andrews UK Limited, 2015, 2015
The system can't perform the operation now. Try again later.
Articles 1–20