


default search action
Haider M. Al-Khateeb
Person information
- affiliation: University of Wolverhampton, School of Mathematics and Computer Science, UK
- affiliation: University of Bedfordshire, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Tanaka Laura Makonese, Vladlena Benson, Samiya Khan, Usman Javed Butt:
Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants. Int. J. Electron. Secur. Digit. Forensics 17(1/2): 1-29 (2025) - 2023
- [j20]Usman Javed Butt
, Osama Hussien
, Krison Hasanaj, Khaled Shaalan
, Bilal Hassan
, Haider M. Al-Khateeb
:
Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks. Algorithms 16(12): 549 (2023) - [j19]Obinna Johnphill
, Ali Safaa Sadiq
, Feras N. Al-Obeidat
, Haider M. Al-Khateeb
, Mohammed Adam Taheir, Omprakash Kaiwartya
, Mohammed Ali
:
Self-Healing in Cyber-Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools. Future Internet 15(7): 244 (2023) - [j18]Mary Asante
, Gregory Epiphaniou
, Carsten Maple
, Haider M. Al-Khateeb
, Mirko Bottarelli, Kayhan Zrar Ghafoor
:
Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey. IEEE Trans. Engineering Management 70(2): 713-739 (2023) - [c6]Oksana Adamyk
, Vladlena Benson, Bogdan Adamyk
, Haider M. Al-Khateeb
, Anitha K. Chinnaswamy
:
Does Artificial Intelligence Help Reduce Audit Risks? ACIT 2023: 294-298 - 2022
- [j17]Gabriela Ahmadi-Assalemi
, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Amar Aggoun
:
Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems. IEEE Internet Things J. 9(15): 13279-13297 (2022) - [j16]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Amar Aggoun
:
Privacy-enhancing technologies in the design of digital twins for smart cities. Netw. Secur. 2022(7) (2022) - [j15]Rafael Salema Marques
, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Carsten Maple
:
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition. IEEE Trans. Inf. Forensics Secur. 17: 700-715 (2022) - [i3]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb
:
Blockchain technologies in the design of Industrial Control Systems for Smart Cities. CoRR abs/2209.12041 (2022) - 2021
- [j14]Gabriela Ahmadi-Assalemi
, Haider M. Al-Khateeb
, Carsten Maple, Gregory Epiphaniou
, Mohammad Hammoudeh
, Hamid Jahankhani, Prashant Pillai:
Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data. Comput. Electr. Eng. 91: 107047 (2021) - [j13]Nikolaos Ersotelos
, Mirko Bottarelli, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Zhraa A. Alhaboby
, Prashant Pillai, Amar Aggoun
:
Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study. J. Sens. Actuator Networks 10(1): 1 (2021) - [j12]Rafael Salema Marques, Gregory Epiphaniou, Haider M. Al-Khateeb
, Carsten Maple, Mohammad Hammoudeh
, Paulo André Lima de Castro
, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks. ACM Trans. Internet Techn. 21(4): 103:1-103:30 (2021) - 2020
- [j11]Gregory Epiphaniou
, Prashant Pillai
, Mirko Bottarelli, Haider M. Al-Khateeb
, Mohammad Hammoudeh
, Carsten Maple
:
Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security". IEEE Trans. Engineering Management 67(3): 979 (2020) - [j10]Gregory Epiphaniou
, Prashant Pillai
, Mirko Bottarelli, Haider M. Al-Khateeb
, Mohammad Hammoudeh
, Carsten Maple
:
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Trans. Engineering Management 67(4): 1059-1073 (2020)
2010 – 2019
- 2019
- [j9]Marcus Walshe, Gregory Epiphaniou, Haider M. Al-Khateeb
, Mohammad Hammoudeh
, Vasilios Katos, Ali Dehghantanha:
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks 95 (2019) - [j8]Mike Mackintosh, Gregory Epiphaniou
, Haider M. Al-Khateeb
, Keith J. Burnham, Prashant Pillai, Mohammad Hammoudeh
:
Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems. J. Sens. Actuator Networks 8(1): 14 (2019) - [c5]Gabriela Ahmadi-Assalemi
, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Jon Cosson, Hamid Jahankhani, Prashant Pillai:
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace. ICGS3 2019 - [c4]David A. E. Haddon, Haider M. Al-Khateeb:
Investigating Data Exfiltration in DNS Over HTTPS Queries. ICGS3 2019 - [c3]Joseph Waldu Woensdregt, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Hamid Jahankhani:
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms. ICGS3 2019 - 2018
- [j7]Mirko Bottarelli, Gregory Epiphaniou
, Dhouha Kbaier Ben Ismail
, Petros Karadimas
, Haider M. Al-Khateeb
:
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Comput. Secur. 78: 454-476 (2018) - [j6]Mustafa Irshad, Haider M. Al-Khateeb, Ali Mansour, Moses Ashawa, Muhammad Hamisu:
Effective methods to detect metamorphic malware: a systematic review. Int. J. Electron. Secur. Digit. Forensics 10(2): 138-154 (2018) - [j5]Gregory Epiphaniou
, Petros Karadimas
, Dhouha Kbaier Ben Ismail
, Haider M. Al-Khateeb
, Ali Dehghantanha, Kim-Kwang Raymond Choo
:
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks. IEEE Internet Things J. 5(4): 2496-2505 (2018) - [c2]Mirko Bottarelli, Gregory Epiphaniou
, Dhouha Kbaier Ben Ismail
, Petros Karadimas, Haider M. Al-Khateeb
:
Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. Cyber Security 2018: 1-8 - [i2]Hamish Haughey, Gregory Epiphaniou, Haider M. Al-Khateeb, Ali Dehghantanha:
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence. CoRR abs/1808.01155 (2018) - [i1]Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider M. Al-Khateeb, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks. CoRR abs/1808.01202 (2018) - 2017
- [j4]Haider M. Al-Khateeb
, Gregory Epiphaniou
, Zhraa A. Alhaboby
, James Barnes, Emma Short:
Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility. Telematics Informatics 34(4): 339-349 (2017) - 2016
- [j3]Ingo Frommholz, Haider M. Al-Khateeb
, Martin Potthast
, Zinnar Ghasem, Mitul Shukla
, Emma Short:
On Textual Analysis and Machine Learning for Cyberstalking Detection. Datenbank-Spektrum 16(2): 127-135 (2016) - [j2]Cassandra Flowers, Ali Mansour, Haider M. Al-Khateeb
:
Web browser artefacts in private and portable modes: a forensic investigation. Int. J. Electron. Secur. Digit. Forensics 8(2): 99-117 (2016) - [j1]Hamish Haughey, Gregory Epiphaniou
, Haider M. Al-Khateeb
:
Anonymity networks and the fragile cyber ecosystem. Netw. Secur. 2016(3): 10-18 (2016) - [c1]Waleed Alabbas, Haider M. Al-Khateeb
, Ali Mansour:
Arabic text classification methods: Systematic literature review of primary studies. CIST 2016: 361-367 - 2011
- [b1]Haider M. Al-Khateeb:
Security and usability in click-based authentication systems. University of Bedfordshire, UK, 2011
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint