Mohammed H. Almeshekah

According to our database1, Mohammed H. Almeshekah authored at least 9 papers between 2013 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Hypergame Analysis for ErsatzPasswords.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

2016
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords.
ACM Trans. Priv. Secur., 2016

Cyber Security Deception.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Enhancing Passwords Security Using Deceptive Covert Communication.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Using Deceptive Information in Computer Security Defenses.
Int. J. Cyber Warf. Terror., 2014

Planning and Integrating Deception into Computer Security Defenses.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2013
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication.
Proceedings of the Security Protocols XXI, 2013

Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013


  Loading...