Name Dr Haider M. Al-Khateeb
Job Title Senior Lecturer in Cyber Security
Faculty Faculty of Science and Engineering
School Mathematics and Computer Science
Subject(s) Computer Science
Tel 01902 322190
Email H.Al-Khateeb@wlv.ac.uk

Dr Haider M. al-Khateeb

Dr Haider M. al-Khateeb

PhD BSc(Hons) PgCAP FHEA CEH

 

Dr al-Khateeb specialises in Cybersecurity, Digital Forensics and Incident Response (DFIR), he is a Fellow of the Higher Education Academy (FHEA) and holds a first-class BSc (Hons) in Computer Science, and PhD in Cybersecurity. Haider is a Senior Lecturer and conduct his research at the Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton.

 

Haider has delivered a range of hands-on technical training on topics such as Ethical Hacking as part of a proactive approach to protect computer systems. He has many years of experience with Transnational Education (TNE) as a Link-coordinator of franchised courses and a flying faculty team, supported MSc programmes at Northumbria University, as well as delivering Executive Master's degrees in Cybersecurity through leading IT training providers in the UK such as QA Ltd. Earlier in his career, he was a lecturer at the School of Computer Science and Technology, University of Bedfordshire.

 

He has published numerous professional and peer-reviewed articles. His research interests include User Authentication Methods, Distributed Digital Forensics and Remote Incident Response and Security for Cyber-Physical Systems (CPS). Additionally, Haider is interested in multidisciplinary projects to mitigate cyber-related challenges such as online anti-social behaviour. By the end of 2017, Haider has supervised 30 BSc final year projects, 51 MSc dissertations and 1 PhD to successful completion.

 

His interest in a broad range of collaborative activities has led to work with national and international researchers to publish in leading journals and to write proposals addressing funding calls, in total he has assisted in the generation of over £1m. Within his area of expertise, he has also worked with new businesses, SMEs to launch new products, and co-authored a book in 2015 that was produced in partnership with the Police to provide a practical guide to victims of Cyberstalking.

 

His quality work has attracted various awards, recent recognitions include a Best Conference Paper Award in 2016, nomination by Northumbria SU to a Student-Led Teaching Award in 2017 and a University of Bedfordshire Achievement Award in 2016.

 

When Haider has free time, he enjoys reading, coding, jogging, swimming, playing football and travelling.

 

Collaboration

If you are an active researcher, or a candidate PhD/MSc by research student, or representing a company interested in  (KTP), get in touch: H.Al-Khateeb@wlv.ac.uk

Some other information and links can be found on my personal pages at: http://blog.hakzone.info

Areas of Expertise

 

Dr al-Khateeb specialises in Cybersecurity with strong teaching and training experience informed by both academic and applied research in the following areas:

 

  • Ethical Hacking – Footprinting and Reconnaissance, Network Scanning, MiTM attacks, etc.
  • Incident Response (IR) – Incident Handling capabilities and management, IR lifecycle, Remote IR, etc.
  • Digital Forensics – Data Acquisition and Analysis, Digital Evidence, Sound Methodologies and Guidelines, Internet Forensics, Image and TCP/IP Steganography, etc.
  • Information Security – Risk Management and Assurance Methodologies, Security Testing, AAA, Information Governance, etc.

Research Interests

 

Areas of General Research Interest

  • Cybersecurity and Privacy.
  • Authentication Methods.
  • Distributed Digital Forensics and Remote Incident Response.
  • Security of IoT and Cyber-Physical Systems (CPS).
  • Utilising technology to mitigate online cybercrime.

 

Research Trends and Current Work – each year, new research trends emerge, and these are of particular interest when associated to my areas of expertise. To give an example, Automation, AI, and Machine Learning continue as a market research trend in 2018 and these have been part of PhD student’s work where we look at event detection. We are building an early alert system based on Twitter as a key enabler for Open-source Intelligence (OSINT). Likewise, Blockchain technology is another trending area of research.

 

Another current area of activity is formed around Smart Cities, Cyber-Physical Systems (CPS) and Security for Connected Cars. CPS and associated disruptive technologies have not yet been matched with appropriate security by design and lack approaches to incorporate proactive and preventative measures.

Multidisciplinary Research – Interpreting security as a process (not a task or product) has extended my research interest towards multidisciplinary projects. For example, I have been working on methods to detect, preserve and report digital evidence of cybercrime, especially anti-social behaviour (e.g. online harassment and stalking) taking place on social media. To achieve this objective, collaborations with psychologists, doctors, national helplines and the police were required to conduct risk assessment, study the impact on individuals and facilitate suitable incident response.

 

Collaboration

If you are an active researcher, or a candidate PhD/MSc by research student, or representing a company interested in  (KTP), get in touch: H.Al-Khateeb@wlv.ac.uk

Some other information and links can be found on my personal pages at: http://blog.hakzone.info

  • CEH – Certified Ethical Hacker (v9), EC-Council.
  • FHEA – Fellow of Higher Education Academy, UK.
  • ISOC – The Internet Society, UK – England Chapter.
  • BCS – Educational Affiliate Employee Member.

Journal Papers

 

H. M. Al-Khateeb, G. Epiphaniou, A. Reviczky, P. Karadimas, and H. Heidari, “Proactive threat detection for connected cars using recursive Bayesian estimation”, IEEE Sensors Journal, IN PRESS, ISSN: 1530-437X. DOI: 10.1109/JSEN.2017.2782751. [Online]. Available: https://doi.org/10.1109/JSEN.2017.2782751.

 

G. Epiphaniou, P. Karadimas, D. K. B. Ismail, H. M. Al-Khateeb, A. Dehghantanha, and K. K. R. Choo, “Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social iot networks”, IEEE Internet of Things Journal, IN PRESS, ISSN: 2327-4662. DOI: 10.1109/JIOT.2017.2764384. [Online]. Available: https://doi.org/10.1109/JIOT.2017.2764384.

 

M. Irshad, H. M. Al-Khateeb, A. Mansour, A. Ashawa, and M. Hamisu, “Effective methods to detect metamorphic malware: A systematic review”, International Journal of Electronic Security and Digital Forensics, vol. 10, no. 2, pp. 138–154, 2018, ISSN: 1751-9128. DOI: 10.1504/IJESDF.2018.090948. [Online]. Available: https://doi.org/10.1504/IJESDF.2018.090948.

 

H. M. Al-Khateeb, G. Epiphaniou, Z. A. Alhaboby, J. Barnes, and E. Short, “Cyberstalking: Investigating formal intervention and the role of corporate social responsibility”, Telematics and Informatics, vol. 34, no. 4, pp. 339–349, 2017, ISSN: 0736-5853. DOI: https://doi.org/10.1016/j.tele.2016.08.016. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S073658531630140X.

 

Z. A. Alhaboby, H. M. Al-Khateeb, J. Barnes, and E. Short, “‘the language is disgusting and they refer to my disability’:The cyberharassment of disabled people”, Disability & Society, vol. 31, no. 8, pp. 1138–1143, 2016. DOI: 10.1080/09687599.2016.1235313. [Online]. Available: https://doi.org/10.1080/09687599.2016.1235313.

 

I. Frommholz, H. M. Al-Khateeb, M. Potthast, Z. Ghasem, M. Shukla, and E. Short, “On textual analysis and machine learning for cyberstalking detection”, Datenbank-Spektrum, vol. 16, no. 2, pp. 127–135, Jul. 2016, ISSN: 1610-1995. DOI: 10.1007/s13222-016-0221-x. [Online]. Available: https://doi.org/10.1007/s13222-016-0221-x.

 

C. Flowers, A. Mansour, and H. M. Al-Khateeb, “Web browser artefacts in private and portable modes: A forensic investigation”, Int. J. of Electronic Security and Digital Forensics, vol. 8, no. 2, pp. 99–117, IN PRESS, ISSN: 1751-9128. DOI: 10.1504/IJESDF.2016.075583. [Online]. Available: https://doi.org/10.1504/IJESDF.2016.075583.

 

H. Haughey, G. Epiphaniou, and H. M. Al-Khateeb, “Anonymity networks and the fragile cyber ecosystem”, Network Security, vol. 2016, no. 3, pp. 10–18, 2016, ISSN: 1353-4858. DOI: https://doi.org/10.1016/S1353-4858(16)30028-9. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1353485816300289.

 

H. M. Al-Khateeb and G. Epiphaniou, “How technology can mitigate and counteract cyber-stalking and online grooming”, Computer Fraud & Security, vol. 2016, no. 1, pp. 14–18, 2016, ISSN: 1361-3723. DOI: https://doi.org/10.1016/S1361-3723(16)30008-2. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1361372316300082.

 

 

Conference Papers

 

M. Bottarelli, G. Epiphaniou, D. K. B. Ismail, P. Karadimas, and H. M. Al-Khateeb, “Quantisation feasibility and performance of rss-based secret key extraction in vanets”, in International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Scotland, UK: IEEE, Jun. ACCEPTED.

 

G. Lee, G. Epiphaniou, H. M. Al-Khateeb, and C. Maple, “Security and privacy of things: Regulatory challenges and gaps for the secure integration of cyber-physical systems”, in Third International Congress on Information and Communication Technology (ICICT 2018), London, UK: Springer, 27-28 Feb. ACCEPTED.

 

D. K. B. Ismail, P. Karadimas, G. Epiphaniou, and H. M. Al-Khateeb, “Optimizing turbo codes for secret key generation in vehicular ad hoc networks”, in The 1st American University in The Emirates International Research Conference (AUEIRC), Dubai, United Arab Emirates: Springer, 15-16 Nov. ACCEPTED.

 

W. Alabbas, H. M. Al-Khateeb, A. Mansour, G. Epiphaniou, and I. Frommholz, “Classification of colloquial Arabic tweets in real-time to detect high-risk floods”, in 2017 International Conference On Social Media, Wearable And Web Analytics (Social Media), London, UK: IEEE, 19-20 Jun 2017, pp. 1–8. DOI: 10.1109/SOCIALMEDIA.2017.8057358. [Online]. Available: https://doi.org/10.1109/SOCIALMEDIA.2017.8057358.

 

G. Epiphaniou, T. French, H. M. Al-Khateeb, A. Dehghantanha, and H. Jahankhani, “A novel anonymity quantification and preservation model for undernet relay networks”, in Global Security, Safety and Sustainability – The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, H. Jahankhani, A. Carlile, D. Emm, A. Hosseinian-Far, G. Brown, G. Sexton, and A. Jamal, Eds., vol. 630, Cham: Springer International Publishing, 2016, pp. 371–384, ISBN: 978-3-319-51064-4. DOI: 10.1007/978-3-319-51064-4_30. [Online]. Available: https://doi.org/10.1007/978-3-319-51064-4_30.

 

W. Alabbas, H. M. Al-Khateeb, and A. Mansour, “Arabic text classification methods: Systematic literature review of primary studies”, in 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), Tangier, 24-26 Oct 2016, pp. 361–367. DOI: 10.1109/CIST.2016.7805072. [Online]. Available: https://doi.org/10.1109/CIST.2016.7805072.

 

E. Oriwoh, H. M. Al-Khateeb, and M. Conrad, “Responsibility and non-repudiation in resource-constrained internet of things scenarios”, in International Conference on Computing and Technology Innovation (CTI 2015), University of Bedfordshire, Luton, United Kingdom, 27-28 May 2015. DOI: 10.13140/RG.2.1.4030.3124. [Online]. Available: https://doi.org/10.13140/RG.2.1.4030.3124.

 

H. M. al-Khateeb and C. Maple, “Ccbs – a method to maintain memorability, accuracy of password submission and the effective password space in click-based visual passwords”, in IADIS International Workshop on the Transgressive Uses of Collaborative Systems 2011 (TUCS 2011), MCCSIS, Rome, Italy: IADIS, 20-26 Jul 2011, pp. 269–276. DOI: 10.13140/RG.2.2.25610.67522. [Online]. Available: https://doi.org/10.13140/RG.2.2.25610.67522.

 

H. M. al-Khateeb, C. Maple, and M. Conrad, “Enhancing usability and security in click-based visual password systems”, in IADIS e-Society 2010, Porto, Portugal: IADIS, 18-21 Mar 2010, pp. 371–376. DOI: 10.13140/RG.2.1.3610.2249. [Online]. Available: https://doi.org/10.13140/RG.2.1.3610.2249.

 

H. M. Al-Khateeb, C. Maple, and M. Conrad, “Hybridpass: Authentication mechanism for web applications- both secure and user-friendly”, in IADIS International Conference e-Society 2009, Barcelona, Spain: IADIS, 25-28 Feb 2009.

 

 

Book Chapters

 

Z. A. Alhaboby, D. Alhaboby, H. M. al-Khateeb, G. Epiphaniou, D. K. B. Ismail, H. Jahankhani, and P. Pillai, “Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled disease management programmes”, in Cyber Criminology. Advanced Sciences and Technologies for Security Applications, H. Jahankhani, Ed. Cham: Springer International Publishing, ACCEPTED.

 

H. Haughey, G. Epiphaniou, H. M. al-Khateeb, and A. Dehghantanha, “Adaptive traffic fingerprinting for darknet threat intelligence”, in Cyber Threat Intelligence, A. Dehghantanha, M. Conti, and T. Dargahi, Eds. Cham: Springer International Publishing, 2018, vol. 70, pp. 193–217, ISBN: 978-3-319-73951-9. DOI: 10.1007/978-3-319-73951-9_10. [Online]. Available: https://doi.org/10.1007/978-3-319-73951-9_10.

 

H. M. al-Khateeb and P. Cobley, “How you can preserve digital evidence and why it is important”, in A Practical Guide To Coping With Cyberstalking. National Centre for Cyberstalking Research, Andrews UK Limited, 2015, pp. 50–62.

 

H. M. al-Khateeb, “How you can protect your computer and mobile devices from malware and data theft”, in A Practical Guide To Coping With Cyberstalking. National Centre for Cyberstalking Research, Andrews UK Limited, 2015, pp. 114–125.

 

H. M. al-Khateeb and M. Shukla, “Social engineering – how strong is your human security?”, in A Practical Guide To Coping With Cyberstalking. National Centre for Cyberstalking Research, Andrews UK Limited, 2015, pp. 126–135.

 

 

Technical and Original Research-based Articles Published in Professional Journals

 

M. Ashawa, A. Mansour, and H. M. al-Khateeb, Extracting data from android’s instant messaging & social media apps, Issue 33, UK: Digital Forensics Magazine, TR Media Ltd, 2017, pp. 62–67. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

A. Momi and H. M. al-Khateeb, GRR rapid response, Issue 32, UK: Digital Forensics Magazine, TR Media Ltd, 2017, pp. 14–18. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

S. Al-Himali and H. M. al-Khateeb, Bitcoin forensics, Issue 31, UK: Digital Forensics Magazine, TR Media Ltd, 2017, pp. 66–70. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

I. Dhaliwal, H. M. al-Khateeb, and G. Epiphaniou, Chromecast 2.0 log extraction and analysis, Issue 28, UK: Digital Forensics Magazine, TR Media Ltd, 2016, pp. 44–48. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

A. Drabek and H. M. al-Khateeb, Network steganalysis, Issue 26, UK: Digital Forensics Magazine, TR Media Ltd, 2016, pp. 66–71. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

A. Momi and H. M. al-Khateeb, A deception tool to improve security, Issue 25, UK: Digital Forensics Magazine, TR Media Ltd, 2015, pp. 26–31. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

A. Momi and H. M. Al-Khateeb, Trapping the attacker: Implementing virtual honeynets as a deception tool and alert system, Issue 24, UK: Digital Forensics Magazine, TR Media Ltd, 2015, pp. 64–68. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

A. Momi and H. M. al-Khateeb, Trapping the attacker: An investigation into the modern application of honeypots, Issue 23, UK: Digital Forensics Magazine, TR Media Ltd, 2015, pp. 46–50. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

E. Oriwoh and H. M. al-Khateeb, Internet-of-things: Towards a forensic methodology, Issue 22, UK: Digital Forensics Magazine, TR Media Ltd, 2015, pp. 34–37. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

H. M. al-Khateeb and E. Strelcenia, Recovering cryptographic keys from memory, Issue 21, UK: Digital Forensics Magazine, TR Media Ltd, 2014, pp. 32–36. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

H. M. al-Khateeb, Recovering user passwords from memory, Issue 20, UK: Digital Forensics Magazine, TR Media Ltd, 2014, pp. 8–12. [Online]. Available: https://www.digitalforensicsmagazine.com/.

 

H. M. al-Khateeb and C. Maple, Memory forensics: Harvesting windows credentials from volatile storage, Issue 19, UK: Digital Forensics Magazine, TR Media Ltd, 2014, pp. 32–36. [Online]. Available: https://www.digitalforensicsmagazine.com/.