Home / Publications

Publications

[Book Chapter] Cyber Security Deception

Mohammed H. Almeshekah and Eugene H. Spafford In Cyber Deception, S. Jajodia et al. (eds.), Springer International Publishing Switzerland 2016. ABSTRACT: Most data is digitized and stored in organizations’ servers, making them a valuable target. Advanced persistent threats (APT), corporate espionage, and other forms of attacks are continuously increasing. Companies reported …

Read More »

I have successfully defenses my PhD thesis on “Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses”

I have successfully defended my PhD thesis and ended my journey at Purdue. This would have not been possible without the help and guidance from my advisors Prof. Eugene H. Spafford (aka. Spaf) and Prof. Mikhal J. Atallah (aka. Mike). I was honored to have the opportunity to learn from such renowned scientists and …

Read More »

[Paper] Enhancing Passwords Security using Deceptive Covert Communication

Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford International Conference on ICT Systems Security and Privacy Protection, IFIP SEC’15, May 26-28, 2015, Hamburg, Germany ABSTRACT: The use of deception to enhance security has shown promising results as a defensive technique. In this paper we present an authentication scheme that …

Read More »

[Poster] Modeling Deception In Information Security As A Hypergame — A Primer

Chris Gutierrez, Mohammed H. Almeshekah, Jeff Avery, Saurabh Bagchi and Eugene H. Spafford 16th Annual CERIAS Information Security Symposium: Poster, West Lafayette, IN, USA, March 2015 ABSTRACT: In order to use deception as a viable information security defensive mechanism, one must properly analyze the conflict at hand. There is little work that …

Read More »

[Paper] Planning and Integrating Deception into Computer Security Defenses

Mohammed H. Almeshekah and Eugene H. Spafford New Security Paradigms Workshop (NSPW’14), Victoria, BC, Canada, 15-18 September 2014 ABSTRACT: Deceptive techniques played a prominent role in many human conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the …

Read More »

[Paper] Using Deceptive Information in Computer Security Defenses

Mohammed H. Almeshekah and Eugene H. Spafford International Journal of Cyber Warfare and Terrorism (IJCWT), 4 (3), 46-58, July-September 2014, IGI Global ABSTRACT: In this paper the authors present a novel taxonomy of methods and techniques that can be used to protect digital information. The authors discuss how information has been …

Read More »

[Poster] The Password Wall — A Better Defense against Password Exposure

Mohammed H. Almeshekah, Mikhail J. Atallah & Eugene H. Spafford 15th Annual Information Security Symposium, CERIAS, Purdue, March, 2014 ABSTRACT: We present an authentication scheme that better protects users’ passwords than in currently deployed password-based schemes, without taxing the users’ memory or damaging the user-friendliness of the login process. Our scheme maintains …

Read More »

[Paper] The Case of Using Negative (Deceiving) Information in Data Protection

Mohammed H. Almeshekah and Eugene H. Spafford [Paper] Proceedings of the 9th International Conference on Cyber Warfare and Security ICCWS-2014, ISSN: 2048-9870, Academic Conferences and Publishing International Limited, March 2014 [Poster] 15th Annual Information Security Symposium, CERIAS, Purdue, March, 2014 (Best Poster Award)   ABSTRACT: As the convergence between our physical …

Read More »

Privacy Preserving Access Control Framework

Mohammed H. Almeshekah and Ninghui Li I worked with Prof. Li at Purdue to provide a report on privacy preserving access control framework for project lead by Dr. Waleed Alrodhan on studying the privacy practices in the Saudi Market. Below is a description on the project and the details of the report we …

Read More »