Dr Haider Al-Khateeb

Senior Lecturer in Cyber Security

Email address: H.Al-Khateeb@wlv.ac.ukPhone number: 01902 322190Location: Faculty: Faculty of Science and EngineeringSchool/Institute: School of Mathematics and Computer ScienceAreas of expertise:

Dr al-Khateeb specialises in Cybersecurity with strong teaching and training experience informed by both academic and applied research in the following areas:

  • Ethical Hacking – Footprinting and Reconnaissance, Network Scanning, MiTM attacks, etc.
  • Incident Response (IR) – Incident Handling capabilities and management, IR lifecycle, Remote IR, etc.
  • Digital Forensics – Data Acquisition and Analysis, Digital Evidence, Sound Methodologies and Guidelines, Internet Forensics, Image and TCP/IP Steganography, etc.
  • Information Security – Risk Management and Assurance Methodologies, Security Testing, AAA, Information Governance, etc.

About

Dr Haider M. al-Khateeb

PhD BSc(Hons) FHEA CEH

Dr al-Khateeb specialises in Cybersecurity, Digital Forensics and Incident Response (DFIR), he is a Fellow of the Higher Education Academy (FHEA) and holds a first-class BSc (Hons) in Computer Science, and PhD in Cybersecurity. Haider is a Senior Lecturer and conduct his research at the Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton.

Haider has delivered a range of hand-on technical training on topics such as Ethical Hacking as part of a proactive approach to protect computer systems. He has many years of experience with Transnational Education (TNE) as a Link-coordinator of franchised courses and a flying faculty team, supported MSc programmes at Northumbria University, as well as delivering Executive Master's degrees in Cybersecurity through leading IT training providers in the UK such as QA Ltd. Earlier in his career, he was a lecturer at the School of Computer Science and Technology, University of Bedfordshire.

He has published numerous professional and peer-reviewed articles. His research interests include User Authentication Methods, Distributed Digital Forensics and Remote Incident Response and Security for Cyber-Physical Systems (CPS). Additionally, Haider is interested in multiciliary projects to mitigate cyber-related challenges such as online anti-social behaviour. By the end of 2017, Haider has supervised 30 BSc final year projects, 51 MSc dissertations and 1 PhD to successful completion.

His interest in a broad range of collaborative activities has led to work with national and international researchers to publish in leading journals and to write proposals addressing funding calls, in total he has assisted in the generation of over £1m. Within his area of expertise, he has also worked with new businesses, SMEs to launch new products, and co-authored a book in 2015 that was produced in partnership with the Police to provide practical guide to victims of Cyberstalking.

His quality work has attracted various awards, recent recognitions include a Best Conference Paper Award in 2016, nomination by Northumbria SU to a Student Led Teaching Award in 2017 and a University of Bedfordshire Achievement Award in 2016.

When Haider has free time, he enjoys reading, coding, jogging, swimming, playing football and travelling.

Collaboration

If you are an active researcher, or a candidate PhD/MSc by research student, or representing a company looking for innovation, get in touch: H.Al-Khateeb@wlv.ac.uk

Some other information and links can be found on my personal pages at: http://blog.hakzone.info

Research interests

Areas of General Research Interest

  • Cybersecurity and Privacy.
  • Authentication Methods.
  • Distributed Digital Forensics and Remote Incident Response.
  • Security of IoT and Cyber-Physical Systems (CPS).
  • Utilising technology to mitigate online cybercrime.

Research Trends and Current Work – each year, new research trends emerge, and these are of particular interest when associated to my areas of expertise. To give an example, Automation, AI, and Machine Learning continue as a market research trend in 2018 and these have been part of PhD student’s work where we look at event detection. We are building an early alert system based on twitter as a key enabler for Open-source Intelligence (OSINT). Likewise, Blockchain technology is another trending area of research.

Another current area of activity is formed around Cyber-Physical Systems (CPS) and Security for Connected Cars. CPS and associated disruptive technologies have not yet been matched with appropriate security by design and lacks approaches to incorporate proactive and preventative measures.

Multidisciplinary Research – Interpreting security as a process (not a task or product) has extended my research interest towards multidisciplinary projects. For example, I have been working on methods to detect, preserve and report digital evidence of cybercrime, especially anti-social behaviour (e.g. online harassment and stalking) taking place on social media. To achieve this objective, collaboration with psychologists, doctors, national helplines and the police was required to conduct risk assessment, study the impact on individuals and facilitate suitable incident response.

Collaboration

If you are an active researcher, or a candidate PhD/MSc by research student, or representing a company looking for innovation, get in touch: H.Al-Khateeb@wlv.ac.uk

Some other information and links can be found on my personal pages at: http://blog.hakzone.info

Membership of professional bodies

  • CEH – Certified Ethical Hacker (v9), EC-Council.
  • FHEA – Fellow of Higher Education Academy, UK.
  • ISOC – The Internet Society, UK – England Chapter.
  • BCS – Educational Affiliate Employee Member.

Publications

Books

  • H. Jahankhani, S. Kendzierskyj, A. Jamal, G. Epiphaniou, H. M. Al-Khateeb, Blockchain and Clinical Trial. Securing Patient Data. Advanced Sciences and Technologies for Security Applications, Ed. Springer International Publishing, 2019. ISBN: 978-3-030-11288-2. DOI: 10.1007/978-3-030-11289-9. [online]. Available: https://www.springer.com/gb/book/9783030112882.
  • H. M. Al-Khateeb et al., A Practical Guide to Coping with Cyberstalking. National Centre for Cyberstalking Research, Andrews UK Limited, 2015.

Journal Papers

  • M. Mackintosh, G. Epiphaniou, H. M. Al-Khateeb, K Burnham, P. Pillai and M. Hammoudeh, “Preliminaries of Orthogonal Layered Defence using Functional and Assurance Controls in Industrial Control Systems”, Journal of Sensor and Actuator Networks, vol, 8, no 1, 2019, ISSN: 2224-2708. DOI: 10.1016/10.3390/jsan8010014. [online]. Available: https://doi.org/10.3390/jsan8010014.
  • G. Epiphaniou, M. Bottarelli, D. K. B. Ismail, P. Karadimas, and H. M. Al-Khateeb, “Physical characteristics of wireless communication channels for secret key establishment: A survey of the research”, Computers and Security, vol. 78, pp. Pages 454-476, 2018, ISSN: 0167-4048. DOI: 10.1016/j.cose.2018.08.001. [online]. Available: https://doi.org/10.1016/j.cose.2018.08.001.
  • H. M. Al-Khateeb, G. Epiphaniou, A. Reviczky, P. Karadimas, and H. Heidari, “Proactive threat detection for connected cars using recursive Bayesian estimation”, IEEE Sensors Journal, vol. 18, no. 12, pp. 4822 - 4831, 2018, ISSN: 1530-437X. DOI: 10.1109/JSEN.2017.2782751. [Online]. Available: https://doi.org/10.1109/JSEN.2017.2782751.
  • G. Epiphaniou, P. Karadimas, D. K. B. Ismail, H. M. Al-Khateeb, A. Dehghantanha, and K. K. R. Choo, “Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social iot networks”, IEEE Internet of Things Journal, vol. 5, no 4, pp. 2496 - 2505, 2018, ISSN: 2327-4662. DOI: 10.1109/JIOT.2017.2764384. [Online]. Available: https://doi.org/10.1109/JIOT.2017.2764384.
  • M. Irshad, H. M. Al-Khateeb, A. Mansour, A. Ashawa, and M. Hamisu, “Effective methods to detect metamorphic malware: A systematic review”, International Journal of Electronic Security and Digital Forensics, vol. 10, no. 2, pp. 138–154, 2018, ISSN: 1751-9128. DOI: 10.1504/IJESDF.2018.090948. [Online]. Available: https://doi.org/10.1504/IJESDF.2018.090948.
  • H. M. Al-Khateeb, G. Epiphaniou, Z. A. Alhaboby, J. Barnes, and E. Short, “Cyberstalking: Investigating formal intervention and the role of corporate social responsibility”, Telematics and Informatics, vol. 34, no. 4, pp. 339–349, 2017, ISSN: 0736-5853. DOI: 10.1016/j.tele.2016.08.016. [Online]. Available: https://doi.org/10.1016/j.tele.2016.08.016.
  • Z. A. Alhaboby, H. M. Al-Khateeb, J. Barnes, and E. Short, “‘the language is disgusting and they refer to my disability’:The cyberharassment of disabled people”, Disability & Society, vol. 31, no. 8, pp. 1138–1143, 2016. DOI: 10.1080/09687599.2016.1235313. [Online]. Available: https://doi.org/10.1080/09687599.2016.1235313.
  • I. Frommholz, H. M. Al-Khateeb, M. Potthast, Z. Ghasem, M. Shukla, and E. Short, “On textual analysis and machine learning for cyberstalking detection”, Datenbank-Spektrum, vol. 16, no. 2, pp. 127–135, Jul. 2016, ISSN: 1610-1995. DOI: 10.1007/s13222-016-0221-x. [Online]. Available: https://doi.org/10.1007/s13222-016-0221-x.
  • C. Flowers, A. Mansour, and H. M. Al-Khateeb, “Web browser artefacts in private and portable modes: A forensic investigation”, Int. J. of Electronic Security and Digital Forensics, vol. 8, no. 2, pp. 99–117, IN PRESS, ISSN: 1751-9128. DOI: 10.1504/IJESDF.2016.075583. [Online]. Available: https://doi.org/10.1504/IJESDF.2016.075583.
  • H. Haughey, G. Epiphaniou, and H. M. Al-Khateeb, “Anonymity networks and the fragile cyber ecosystem”, Network Security, vol. 2016, no. 3, pp. 10–18, 2016, ISSN: 1353-4858. DOI: 10.1016/S1353-4858(16)30028-9. [Online]. Available: https://doi.org/10.1016/S1353-4858(16)30028-9.
  • H. M. Al-Khateeb and G. Epiphaniou, “How technology can mitigate and counteract cyber-stalking and online grooming”, Computer Fraud & Security, vol. 2016, no. 1, pp. 14–18, 2016, ISSN: 1361-3723. DOI: 10.1016/S1361-3723(16)30008-2. [Online]. Available: https://doi.org/10.1016/S1361-3723(16)30008-2

Conference Papers

  • J. W. Woensdregt, H. M. Al-Khateeb, G. Epiphaniou and H. Jahankhani, “AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms”, In 12th Annual International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK: IEEE, 16 – 18 Jan 2019. DOI: 10.1109/ICGS3.2019.8688328. [online]. Available: https://doi.org/10.1109/ICGS3.2019.8688328.
  • G. Ahmadi-Assalemi, H. M. Al-Khateeb, G. Epiphaniou, J. Cosson and P. Pillai, “Federated Blockchain-based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace”, In 12th Annual International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK: IEEE, 16 – 18 Jan 2019. DOI: 10.1109/ICGS3.2019.8688297. [online]. Available: https://doi.org/10.1109/ICGS3.2019.8688297.
  • M. Bottarelli, G. Epiphaniou, D. K. B. Ismail, P. Karadimas, and H. M. Al-Khateeb, “Quantisation feasibility and performance of rss-based secret key extraction in vanets”, in 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Glasgow, Scotland, UK: IEEE, 11-12 Jun 2018. DOI: 10.1109/CyberSecPODS.2018.8560676. [online]. Available: https://doi.org/10.1109/CyberSecPODS.2018.8560676.
  • Y. Al-Husaini, H. M. Al-Khateeb, M. Warren, and L. Pan, “A Model to Facilitate Collaborative Digital Forensic Investigations for Law Enforcement: The Royal Oman Police as a Case Study”, in 2018 Cyber Forensic and Security International Conference, Nuku’alofa, Kingdom of Tonga: 21-23 Aug 2018.
  • D. K. B. Ismail, P. Karadimas, G. Epiphaniou, and H. M. Al-Khateeb, “Error Reconciliation with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks”, In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Computing. SAI 2018. Advances in Intelligent Systems and Computing, vol 857, pp 696-704, 2019. Springer, Cham. DOI: 10.1007/978-3-030-01177-2_51. [online]. Available: https://doi.org/10.1007/978-3-030-01177-2_51.
  • G. Lee, G. Epiphaniou, H. M. Al-Khateeb, and C. Maple, “Security and privacy of things: Regulatory challenges and gaps for the secure integration of cyber-physical systems”, In: Yang XS., Sherratt S., Dey N., Joshi A. (eds) Third International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol. 797. Springer, Singapore. DOI: 10.1007/978-981-13-1165-9_1. [online]. Available: https://doi.org/10.1007/978-981-13-1165-9_1.
  • D. K. B. Ismail, P. Karadimas, G. Epiphaniou, and H. M. Al-Khateeb, “Optimizing turbo codes for secret key generation in vehicular ad hoc networks”, 1st American University in The Emirates International Research Conference (AUEIRC), Dubai, United Arab Emirates 15-16 Nov 2018. In: Al-Masri A., Curran K. (eds) Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development). Springer, Cham Springer, 2019. DOI: 10.1007/978-3-030-01659-3_33. [online]. Available: https://doi.org/10.1007/978-3-030-01659-3_33.
  • W. Alabbas, H. M. Al-Khateeb, A. Mansour, G. Epiphaniou, and I. Frommholz, “Classification of colloquial Arabic tweets in real-time to detect high-risk floods”, in 2017 International Conference On Social Media, Wearable And Web Analytics (Social Media), London, UK: IEEE, 19-20 Jun 2017, pp. 1–8. DOI: 10.1109/SOCIALMEDIA.2017.8057358. [Online]. Available: https://doi.org/10.1109/SOCIALMEDIA.2017.8057358.
  • G. Epiphaniou, T. French, H. M. Al-Khateeb, A. Dehghantanha, and H. Jahankhani, “A novel anonymity quantification and preservation model for undernet relay networks”, in Global Security, Safety and Sustainability – The Security Challenges of the Connected World. ICGS3 2017. Communications in Commuter and Information Science, H. Jahankhani, A. Carlile, D. Emm, A. Hosseinian-Far, G. Brown, G. Sexton, and A. Jamal, Eds., vol. 630, Cham: Springer International Publishing, 2016, pp. 371–384, ISBN: 978-3-319-51064-4. DOI: 10.1007/978-3-319-51064-4_30. [Online]. Available: https://doi.org/10.1007/978-3-319-51064-4_30.
  • W. Alabbas, H. M. Al-Khateeb, and A. Mansour, “Arabic text classification methods: Systematic literature review of primary studies”, in 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), Tangier: IEEE, 24-26 Oct 2016, pp. 361–367. DOI: 10.1109/CIST.2016.7805072. [Online]. Available: https://doi.org/10.1109/CIST.2016.7805072.
  • E. Oriwoh, H. M. Al-Khateeb, and M. Conrad, “Responsibility and non-repudiation in resource-constrained internet of things scenarios”, in International Conference on Computing and Technology Innovation (CTI 2015), University of Bedfordshire, Luton, United Kingdom, 27-28 May 2015. DOI: 10.13140/RG.2.1.4030.3124. [Online]. Available: https://doi.org/10.13140/RG.2.1.4030.3124.
  • H. M. Al-Khateeb and C. Maple, “CCBS – a method to maintain memorability, accuracy of password submission and the effective password space in click-based visual passwords”, in IADIS International Workshop on the Transgressive Uses of Collaborative Systems 2011 (TUCS 2011), MCCSIS, Rome, Italy: IADIS, 20-26 Jul 2011, pp. 269–276. DOI: 10.13140/RG.2.2.25610.67522. [Online]. Available: https://doi.org/10.13140/RG.2.2.25610.67522.
  • H. M. Al-Khateeb, C. Maple, and M. Conrad, “Enhancing usability and security in click-based visual password systems”, in IADIS e-Society 2010, Porto, Portugal: IADIS, 18-21 Mar 2010, pp. 371–376. DOI: 10.13140/RG.2.1.3610.2249. [Online]. Available: https://doi.org/10.13140/RG.2.1.3610.2249.
  • H. M. Al-Khateeb, C. Maple, and M. Conrad, “Hybridpass: Authentication mechanism for web applications- both secure and user-friendly”, in IADIS International Conference e-Society 2009, Barcelona, Spain: IADIS, 25-28 Feb 2009.

Book Chapters

  • G. Epiphaniou, H. Daly and H. M. Al-Khateeb, “Blockchain and Healthcare”, in Blockchain and Clinical Trial. Securing Patient Data. Advanced Sciences and Technologies for Security Applications, H. Jahankhani, S. Kendzierskyj, A. Jamal, G. Epiphaniou, H. Al-Khateeb, Ed. Cham: Springer International Publishing, 2019, pp. 1–29, ISBN: 978-3-030-11289-9. DOI: 10.1007/978-3-030-11289-9_1. [online]. Available: https://doi.org/10.1007/978-3-030-11289-9_1.
  • H. M. Al-Khateeb, G. Epiphaniou, H. Daly, “Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger”, in Blockchain and Clinical Trial. Securing Patient Data. Advanced Sciences and Technologies for Security Applications, H. Jahankhani, S. Kendzierskyj, A. Jamal, G. Epiphaniou, H. Al-Khateeb, Ed. Cham: Springer International Publishing, 2019, pp. 149–168, ISBN: 978-3-030-11289-9. DOI: 10.1007/978-3-030-11289-9_7. [online]. Available: https://doi.org/10.1007/978-3-030-11289-9_7.
  • Z. A. Alhaboby, D. Alhaboby, H. M. Al-Khateeb, G. Epiphaniou, D. K. B. Ismail, H. Jahankhani, and P. Pillai, “Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled disease management programmes”, in Cyber Criminology. Advanced Sciences and Technologies for Security Applications, H. Jahankhani, Ed. Cham: Springer International Publishing, 2018, pp. 227–250, ISBN: 978-3-319-97181-0. DOI: 978-3-319-97181-0_11. [online]. Available: https://doi.org/10.1007/978-3-319-97181-0_11
  • H. Haughey, G. Epiphaniou, H. M. Al-Khateeb, and A. Dehghantanha, “Adaptive traffic fingerprinting for darknet threat intelligence”, in Cyber Threat Intelligence, A. Dehghantanha, M. Conti, and T. Dargahi, Eds. Cham: Springer International Publishing, 2018, vol. 70, pp. 193–217, ISBN: 978-3-319-73951-9. DOI: 10.1007/978-3-319-73951-9_10. [Online]. Available: https://doi.org/10.1007/978-3-319-73951-9_10
  • H. M. Al-Khateeb and P. Cobley, “How you can preserve digital evidence and why it is important”, in A Practical Guide to Coping with Cyberstalking. National Centre for Cyberstalking Research, Andrews UK Limited, 2015, pp. 50–62.
  • H. M. Al-Khateeb, “How you can protect your computer and mobile devices from malware and data theft”, in A Practical Guide to Coping with Cyberstalking. National Centre for Cyberstalking Research, Andrews UK Limited, 2015, pp. 114–125.
  • H. M. Al-Khateeb and M. Shukla, “Social engineering – how strong is your human security?”, in A Practical Guide to Coping with Cyberstalking. National Centre for Cyberstalking Research, Andrews UK Limited, 2015, pp. 126–135.

Technical and Original Research-based Articles Published in Professional Journals

  • G. Ahmadi-Assalemi, H. M. Al-Khateeb, and C. Maple, Driver Attribution in Connected Cars, Issue 39, UK: Digital Forensics Magazine, TR Media Ltd, 2019, pp. 16–21. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • M. Ashawa, A. Mansour, and H. M. Al-Khateeb, Extracting data from android’s instant messaging & social media apps, Issue 33, UK: Digital Forensics Magazine, TR Media Ltd, 2017, pp. 62–67. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • A. Momi and H. M. Al-Khateeb, GRR rapid response, Issue 32, UK: Digital Forensics Magazine, TR Media Ltd, 2017, pp. 14–18. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • S. Al-Himali and H. M. Al-Khateeb, Bitcoin forensics, Issue 31, UK: Digital Forensics Magazine, TR Media Ltd, 2017, pp. 66–70. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • I. Dhaliwal, H. M. Al-Khateeb, and G. Epiphaniou, Chromecast 2.0 log extraction and analysis, Issue 28, UK: Digital Forensics Magazine, TR Media Ltd, 2016, pp. 44–48. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • A. Drabek and H. M. Al-Khateeb, Network steganalysis, Issue 26, UK: Digital Forensics Magazine, TR Media Ltd, 2016, pp. 66–71. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • A. Momi and H. M. Al-Khateeb, A deception tool to improve security, Issue 25, UK: Digital Forensics Magazine, TR Media Ltd, 2015, pp. 26–31. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • A. Momi and H. M. Al-Khateeb, Trapping the attacker: Implementing virtual honeynets as a deception tool and alert system, Issue 24, UK: Digital Forensics Magazine, TR Media Ltd, 2015, pp. 64–68. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • A. Momi and H. M. Al-Khateeb, Trapping the attacker: An investigation into the modern application of honeypots, Issue 23, UK: Digital Forensics Magazine, TR Media Ltd, 2015, pp. 46–50. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • E. Oriwoh and H. M. Al-Khateeb, Internet-of-things: Towards a forensic methodology, Issue 22, UK: Digital Forensics Magazine, TR Media Ltd, 2015, pp. 34–37. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • H. M. Al-Khateeb and E. Strelcenia, Recovering cryptographic keys from memory, Issue 21, UK: Digital Forensics Magazine, TR Media Ltd, 2014, pp. 32–36. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • H. M. Al-Khateeb, Recovering user passwords from memory, Issue 20, UK: Digital Forensics Magazine, TR Media Ltd, 2014, pp. 8–12. [Online]. Available: https://www.digitalforensicsmagazine.com/.
  • H. M. Al-Khateeb and C. Maple, Memory forensics: Harvesting windows credentials from volatile storage, Issue 19, UK: Digital Forensics Magazine, TR Media Ltd, 2014, pp. 32–36. [Online]. Available: https://www.digitalforensicsmagazine.com/.