Dr Haider al-Khateeb
Dr Haider M. al-Khateeb specialises in Cyber Security, Digital Forensics and Incident Response (DFIR). He holds a first-class BSc (Hons) in Computer Science and PhD in Cyber Security. He is a university lecturer, researcher, consultant, trainer and a Fellow of the Higher Education Academy (FHEA), UK.
Haider has published numerous professional and peer-reviewed articles on topics including authentication methods, IoT forensics, anonymity and steganography. He is an associate lecturer for Northumbria University (London Campus) and QA Higher Education (QA Ltd). He is also a lecturer in the Department of Computer Science and Technology, University of Bedfordshire. He supervises students at MSc/MPhil and PhD levels.
Interpreting security as a process (not a task or product) has extended Haider’s research interest towards multidisciplinary projects. As a fellow of the National Centre for Cyberstalking Research (NCCR), he has also been working on methods to detect, preserve and report digital evidence of cybercrime, especially anti-social behaviour (e.g. online harassment and stalking) taking place on social media. This includes collaboration with psychologists, doctors, national helplines and the police to conduct risk assessment, study the impact on individuals and facilitate incident response.
Additionally, Haider travels to deliver classes and workshops outside the UK since 2014. Other recent activities include co-authoring a book on Cyberstalking in partnership with Bedfordshire Police; a project with ERSOU (Eastern Region Special Operations Unit) on Malware analysis and reverse engineering; and regularly authoring articles for the Digital Forensics Magazine.
When he has free time, he enjoys reading, coding, jogging, swimming, playing football and travelling.
Recent Publications
- Frommholz, I., al-Khateeb, H.M., Potthast, M., Ghasem, Z., Shukla, M. and Short, E. (2016) ‘On Textual Analysis and Machine Learning for Cyberstalking Detection’. Datenbank-Spektrum, 16(2), pp.1-9. http://dx.doi.org/10.1007/s13222-016-0221-x.
- Flowers, C., Mansour, A., Al-Khateeb, H. (2016) ‘Web Browser Artefacts in Private and Portable Modes: A Forensic Investigation’, Int. J. of Electronic Security and Digital Forensics, Vol. 8, No. 2, pp.99–117. http://dx.doi.org/10.1504/IJESDF.2016.075583.
- Haughey, H., Epiphaniou, G., al-Khateeb, H. M. (2016), ‘Anonymity networks and the fragile cyber ecosystem’, Network Security, Volume 2016, Issue 3, January 2016, Pages 10-18, ISSN 1353-4858, http://dx.doi.org/10.1016/S1353-4858(16)30028-9.
- Drabek, A., al-Khateeb, H. M. (2016) ‘Network Steganalysis’, Digital Forensics Magazine, 2016(26): 66-71.
- al-Khateeb, H. M., Epiphaniou, G. (2016), ‘How technology can mitigate and counteract cyber-stalking and online grooming’, Computer Fraud & Security, Volume 2016, Issue 1, January 2016, Pages 14-18, ISSN 1361-3723, http://dx.doi.org/10.1016/S1361-3723(16)30008-2.
- Oriwoh, E., al-Khateeb, H. M., Conrad M. (2015) ‘Responsibility and Non-repudiation in resource-constrained Internet of Things scenarios’, International Conference on Computing and Technology Innovation (CTI 2015). May 27 – 28, 2015 at University of Bedfordshire, Luton, United Kingdom, http://dx.doi.org/10.13140/RG.2.1.4030.3124.
- Momi, A., al-Khateeb, H. M. (2015) ‘A deception tool to improve security’, Digital Forensics Magazine, 2015(25): 26-31.
- Momi, A., al-Khateeb, H. M. (2015) ‘Trapping the Attacker: Implementing virtual Honeynets as a deception tool and alert system’, Digital Forensics Magazine, 2015(24): 64-68.
- Momi, A., al-Khateeb, H. M. (2015) ‘Trapping the Attacker: An investigation into the modern application of Honeypots’, Digital Forensics Magazine, 2015(23): 46-50.
- Oriwoh, E., al-Khateeb, H. M. (2015) ‘Internet-Of-Things: Towards a Forensic Methodology’, Digital Forensics Magazine, 2015(22): 34-37.
- al-Khateeb, H. M., Cobley, P. (2015) ‘How you can Preserve Digital Evidence and why it is Important’, A Practical Guide To Coping With Cyberstalking, National Centre for Cyberstalking Research, UK: Andrews UK Limited, pp.50-62.
- al-Khateeb, H. M. (2015) ‘How you can Protect Your Computer and Mobile Devices from Malware and Data Theft’, A Practical Guide To Coping With Cyberstalking, National Centre for Cyberstalking Research, UK: Andrews UK Limited, pp.114-125.
- al-Khateeb, H. M., Shukla, M. (2015) ‘Social Engineering – How Strong is your Human Security?’, A Practical Guide To Coping With Cyberstalking, National Centre for Cyberstalking Research, UK: Andrews UK Limited, pp.126-135.
Reviewer
- Computers & Security (Elsevier) since Oct 2015.
- Central European journal of Computer Science (CEJCS)
Research
- Authentication Methods
- Cyber-security and Privacy
- Digital Forensics for IoT and Cloud Computing
- Online-harassment and Cyberstalking
Fund, Projects and Research Collaboration
Haider works with the industry, in 2016 he was part of two Innovation Vouchers in Cyber Security (Innovate UK funded project). Currently part of a two-year project supported by a Police Innovation Fund (Home Office, UK) titled “Cyberharassment: Platform for Evidence Gathering, Assessing Risk & Managing Policing”. This work includes collaboration with psychologists, doctors, national helplines and the police to conduct risk assessment, study the impact on individuals and facilitate incident response powered by technology.