Sledovat
Mohammed H. Almeshekah
Mohammed H. Almeshekah
Outliers Venture Capital
Žádná ověřená e-mailová adresa - Domovská stránka
Název
Citace
Citace
Rok
Planning and integrating deception into computer security defenses
MH Almeshekah, EH Spafford
Proceedings of the 2014 New Security Paradigms Workshop, 127-138, 2014
1422014
Cyber security deception
MH Almeshekah, EH Spafford
Cyber Deception: Building the Scientific Foundation, 23-50, 2016
1182016
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage
MH Almeshekah, CN Gutierrez, MJ Atallah, EH Spafford
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
562015
Improving Security using Deception
MH Almeshekah, EH Spafford, M Atallah
Technical Report CERIAS Tech Report 2013-13, Center for Education and …, 2013
402013
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses
MH Almeshekah
PURDUE UNIVERSITY, 2015
352015
Modeling Deception In Information Security As A Hypergame–A Primer
CN Gutierrez, S Bagchi, H Mohammed, J Avery
Proceedings of the 16th Annual Information Security Symposium, 41, 2015
142015
The case of using negative (deceiving) information in data protection
M Almeshekah, E Spafford
International Conference on Cyber Warfare and Security, 237, 2014
112014
Offensive deception in computing
J Avery, M Almeshekah, E Spafford
International Conference on Cyber Warfare and Security, 23, 2017
92017
Enhancing Passwords Security using Deceptive Covert Communication⋆
MH Almeshekah, MJ Atallah, EH Spafford
International Conference on ICT Systems Security and Privacy Protection …, 2015
72015
Using Deceptive Information in Computer Security Defenses
MH Almeshekah, EH Spafford
International Journal of Cyber Warfare and Terrorism 4 (3), 46-58, 2014
72014
A hypergame analysis for ersatzpasswords
CN Gutierrez, MH Almeshekah, S Bagchi, EH Spafford
ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International …, 2018
52018
Inhibiting and detecting offline password cracking using ErsatzPasswords
CN Gutierrez, MH Almeshekah, EH Spafford, MJ Atallah, J Avery
ACM Transactions on Privacy and Security (TOPS) 19 (3), 1-30, 2016
52016
Back Channels Can Be Useful!–Layering Authentication Channels to Provide Covert Communication
MH Almeshekah, M Atallah, EH Spafford
Security Protocols XXI, 189-195, 2013
52013
Proposal for better revocation model of SSL certificates
M Almeshekah
Mozilla Foundation, 2013
42013
Using deception to enhance security
MH Almeshekah
Purdue University West Lafayette, PhD Dissertation, 2015
32015
ErsatzPasswords–Ending Password Cracking
MH Almeshekah, CN Gutierrez, MJ Atallah, EH Spafford
32015
Defending against Password Exposure using Deceptive Covert Communication
MH Almeshekah, MJ Atallah, EH Spafford
12015
Layering authentication channels to provide covert communication
MH Almeshekah, MJ Atallah, EH Spafford
Proceedings of the 14th Annual Information Security Symposium, 1, 2013
12013
CERIAS Tech Report 2015-11 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses
MH Almeshekah
2015
ErsatzPasswords: ending password cracking
CN Gutierrez, MH Almeshekah, MJ Atallah, EH Spafford
Proceedings of the 16th Annual Information Security Symposium, 1-1, 2015
2015
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20