Dr Haider al-Khateeb

Dr Haider al-Khateeb

Dr Haider M. al-Khateeb specialises in Cyber Security, Digital Forensics and Incident Response (DFIR). He holds a first-class BSc (Hons) in Computer Science and PhD in Cyber Security. He is a university lecturer, researcher, consultant, trainer and a Fellow of the Higher Education Academy (FHEA), UK.

Haider has published numerous professional and peer-reviewed articles on topics including authentication methods, IoT forensics, anonymity and steganography. He is an associate lecturer for Northumbria University (London Campus) and QA Higher Education (QA Ltd). He is also a lecturer in the Department of Computer Science and Technology, University of Bedfordshire. He supervises students at MSc/MPhil and PhD levels.

Interpreting security as a process (not a task or product) has extended Haider’s research interest towards multidisciplinary projects. As a fellow of the National Centre for Cyberstalking Research (NCCR), he has also been working on methods to detect, preserve and report digital evidence of cybercrime, especially anti-social behaviour (e.g. online harassment and stalking) taking place on social media. This includes collaboration with psychologists, doctors, national helplines and the police to conduct risk assessment, study the impact on individuals and facilitate incident response.

Additionally, Haider travels to deliver classes and workshops outside the UK since 2014. Other recent activities include co-authoring a book on Cyberstalking in partnership with Bedfordshire Police; a project with ERSOU (Eastern Region Special Operations Unit) on Malware analysis and reverse engineering; and regularly authoring articles for the Digital Forensics Magazine.

When he has free time, he enjoys reading, coding, jogging, swimming, playing football and travelling.

  • Frommholz, I., al-Khateeb, H.M., Potthast, M., Ghasem, Z., Shukla, M. and Short, E. (2016) ‘On Textual Analysis and Machine Learning for Cyberstalking Detection’. Datenbank-Spektrum, 16(2), pp.1-9. http://dx.doi.org/10.1007/s13222-016-0221-x.
  • Flowers, C., Mansour, A., Al-Khateeb, H. (2016) ‘Web Browser Artefacts in Private and Portable Modes: A Forensic Investigation’, Int. J. of Electronic Security and Digital Forensics, Vol. 8, No. 2, pp.99–117. http://dx.doi.org/10.1504/IJESDF.2016.075583.
  • Haughey, H., Epiphaniou, G., al-Khateeb, H. M. (2016), ‘Anonymity networks and the fragile cyber ecosystem’, Network Security, Volume 2016, Issue 3, January 2016, Pages 10-18, ISSN 1353-4858, http://dx.doi.org/10.1016/S1353-4858(16)30028-9.
  • Drabek, A., al-Khateeb, H. M. (2016) ‘Network Steganalysis’, Digital Forensics Magazine, 2016(26): 66-71.
  • al-Khateeb, H. M., Epiphaniou, G. (2016), ‘How technology can mitigate and counteract cyber-stalking and online grooming’, Computer Fraud & Security, Volume 2016, Issue 1, January 2016, Pages 14-18, ISSN 1361-3723, http://dx.doi.org/10.1016/S1361-3723(16)30008-2.
  • Oriwoh, E., al-Khateeb, H. M., Conrad M. (2015) ‘Responsibility and Non-repudiation in resource-constrained Internet of Things scenarios’, International Conference on Computing and Technology Innovation (CTI 2015). May 27 – 28, 2015 at University of Bedfordshire, Luton, United Kingdom, http://dx.doi.org/10.13140/RG.2.1.4030.3124.
  • Momi, A., al-Khateeb, H. M. (2015) ‘A deception tool to improve security’, Digital Forensics Magazine, 2015(25): 26-31.
  • Momi, A., al-Khateeb, H. M. (2015) ‘Trapping the Attacker: Implementing virtual Honeynets as a deception tool and alert system’, Digital Forensics Magazine, 2015(24): 64-68.
  • Momi, A., al-Khateeb, H. M. (2015) ‘Trapping the Attacker: An investigation into the modern application of Honeypots’, Digital Forensics Magazine, 2015(23): 46-50.
  • Oriwoh, E., al-Khateeb, H. M. (2015) ‘Internet-Of-Things: Towards a Forensic Methodology’, Digital Forensics Magazine, 2015(22): 34-37.
  • al-Khateeb, H. M., Cobley, P. (2015) ‘How you can Preserve Digital Evidence and why it is Important’, A Practical Guide To Coping With Cyberstalking, National Centre for Cyberstalking Research, UK: Andrews UK Limited, pp.50-62.
  • al-Khateeb, H. M. (2015) ‘How you can Protect Your Computer and Mobile Devices from Malware and Data Theft’, A Practical Guide To Coping With Cyberstalking, National Centre for Cyberstalking Research, UK: Andrews UK Limited, pp.114-125.
  • al-Khateeb, H. M., Shukla, M. (2015) ‘Social Engineering – How Strong is your Human Security?’, A Practical Guide To Coping With Cyberstalking, National Centre for Cyberstalking Research, UK: Andrews UK Limited, pp.126-135.
  • Computers & Security (Elsevier) since Oct 2015.
  • Central European journal of Computer Science (CEJCS)
  • Authentication Methods
  • Cyber-security and Privacy
  • Digital Forensics for IoT and Cloud Computing
  • Online-harassment and Cyberstalking

Haider works with the industry, in 2016 he was part of two Innovation Vouchers in Cyber Security (Innovate UK funded project). Currently part of a two-year project supported by a Police Innovation Fund (Home Office, UK) titled “Cyberharassment: Platform for Evidence Gathering, Assessing Risk & Managing Policing”. This work includes collaboration with psychologists, doctors, national helplines and the police to conduct risk assessment, study the impact on individuals and facilitate incident response powered by technology.

Our faculty

Dilek Celik

Lecturer and Research Lead

Discover more

Dr Ning Tse

Programme Leader

Discover more

Dr Jawdat Al-Tarawneh

Business Lecturer and Module Leader for LD9718 Research Methods and Analytics for Business Practice

Discover more

Ian Lebeau

Pre-sessional Programme Leader

Discover more

Nitsa J Herzog

Programme Leader

Discover more

Jie Sun

Marketing Lecturer

Discover more

Dr. Janakan Sothinathan

Senior Lecturer in Business Management

Discover more

Timea Kadar

MSc Digital Marketing Programme Leader

Discover more

Rejwan Bin Sulaiman

Lecturer and Module Leader

Discover more

Dr Chidera Christian Ugwuanyi

Business Lecturer

Discover more

Baba Shaheer Gutappa

Lecturer

Discover more

Dr Nasr Abosata

Lecturer in Cybersecurity

Discover more

Dr Sandy Hassan

Lecturer and Programme Leader

Discover more

Assist. Prof. Dr. Abdulrahman Salih

Assistant Professor in Cyber Security/AI

Discover more

Olugbenga Akintola, PhD

Lecturer of Business and Law

Discover more

Dr Zhewen Tang

Program Leader for MA Luxury Brand Management

Discover more

Richard Chamberlain

English Lecturer and Module Leader for LD7080 Academic Language Skills

Discover more

Elena Volodenko

Associate Dean, English for Academic Purposes

Discover more

Dr Guy Brown

Director of the Northumbria University London Campus

Discover more

Prof Hamid Jahankhani

MSc Cyber Security Programme Leader

Discover more

Dr. Usman Butt

Associate Dean and Head of Department Computing

Discover more

Dr Imad Nawaz

Associate Dean (Post Graduate Business Programmes)

Discover more

Dr. Mojdeh Mehrganrad

Graduate Certificate Pre-Masters Business and BA Business (top-up) Programme Leader

Discover more

Phil Thomas

MSc Project Management Programme Leader

Discover more

Dr Zana Grigaliuniene

BA (Hons) International Banking and Finance (Top-Up) Programme Leader

Discover more

Hemalatha Raj

Academic Community of Excellence (ACE) Computing Lecturer

Discover more

Matthew Fletcher

Academic Community of Excellence (ACE) Lecturer

Discover more

Jo Dennison

Head of Academic Community of Excellence (ACE)

Discover more

Dr Elizabeth Achinewhu-Nworgu

Module Leader for Human Resource Management

Discover more

Dr. Abdul Ali

Operations and Supply Chain Management Lecturer

Discover more

Dr Gordon Bowen

Business and Marketing Lecturer

Discover more

Dr Aliar Hossain

Deputy Associate Dean and HoD Advance Practice NUL

Discover more

Dr Rose CW FONG

Deputy Associate Dean and HoD Computing Department

Discover more

Fin Garvey

Project Management Lecturer

Discover more

Quick contact


Please note, this will overwrite any previous communication preferences you may have already specified to us on our website or websites relating to our University Partners. You can change your communication preferences at any time. QA Higher Education will process your personal data as set out in our privacy notice