Mohammed H. Almeshekah
Mohammed H. Almeshekah
Verified email at ksu.edu.sa - Homepage
Title
Cited by
Cited by
Year
Planning and integrating deception into computer security defenses
MH Almeshekah, EH Spafford
Proceedings of the 2014 New Security Paradigms Workshop, 127-138, 2014
1012014
Cyber security deception
MH Almeshekah, EH Spafford
Cyber Deception, 23-50, 2016
642016
Improving Security using Deception
MH Almeshekah, EH Spafford, M Atallah
Technical Report CERIAS Tech Report 2013-13, Center for Education and …, 2013
352013
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage
MH Almeshekah, CN Gutierrez, MJ Atallah, EH Spafford
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
302015
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses
MH Almeshekah
PURDUE UNIVERSITY, 2015
272015
The case of using negative (deceiving) information in data protection
M Almeshekah, E Spafford
International Conference on Cyber Warfare and Security, 237, 2014
102014
Modeling Deception In Information Security As A Hypergame–A Primer
CN Gutierrez, S Bagchi, H Mohammed, J Avery
Proceedings of the 16th Annual Information Security Symposium, 41, 2015
92015
Enhancing Passwords Security using Deceptive Covert Communication⋆
MH Almeshekah, MJ Atallah, EH Spafford
International Conference on ICT Systems Security and Privacy Protection …, 2015
62015
Using Deceptive Information in Computer Security Defenses
MH Almeshekah, EH Spafford
International Journal of Cyber Warfare and Terrorism 4 (3), 46-58, 2014
62014
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords
CN Gutierrez, MH Almeshekah, EH Spafford, MJ Atallah, J Avery
ACM Transactions on Privacy and Security (TOPS) 19 (3), 9, 2016
42016
Back Channels Can Be Useful!–Layering Authentication Channels to Provide Covert Communication
MH Almeshekah, M Atallah, EH Spafford
Security Protocols XXI, 189-195, 2013
42013
Offensive deception in computing
J Avery, M Almeshekah, E Spafford
International Conference on Cyber Warfare and Security, 23, 2017
32017
Using deception to enhance security
MH Almeshekah
Purdue University West Lafayette, PhD Dissertation, 2015
32015
ErsatzPasswords–Ending Password Cracking
MH Almeshekah, CN Gutierrez, MJ Atallah, EH Spafford
32015
Proposal for better revocation model of SSL certificates
M Almeshekah
Mozilla Foundation, 2013
32013
A Hypergame Analysis for ErsatzPasswords
CN Gutierrez, MH Almeshekah, S Bagchi, EH Spafford
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2018
12018
Defending against Password Exposure using Deceptive Covert Communication
MH Almeshekah, MJ Atallah, EH Spafford
12015
Layering authentication channels to provide covert communication
MH Almeshekah, MJ Atallah, EH Spafford
Proceedings of the 14th Annual Information Security Symposium, 9, 2013
12013
CERIAS Tech Report 2015-11 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses
MH Almeshekah
2015
ErsatzPasswords: ending password cracking
CN Gutierrez, MH Almeshekah, MJ Atallah, EH Spafford
Proceedings of the 16th Annual Information Security Symposium, 37, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20