Planning and integrating deception into computer security defenses MH Almeshekah, EH Spafford Proceedings of the 2014 New Security Paradigms Workshop, 127-138, 2014 | 143 | 2014 |
Cyber security deception MH Almeshekah, EH Spafford Cyber Deception: Building the Scientific Foundation, 23-50, 2016 | 120 | 2016 |
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage MH Almeshekah, CN Gutierrez, MJ Atallah, EH Spafford Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 57 | 2015 |
Improving Security using Deception MH Almeshekah, EH Spafford, M Atallah Technical Report CERIAS Tech Report 2013-13, Center for Education and …, 2013 | 44 | 2013 |
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses MH Almeshekah PURDUE UNIVERSITY, 2015 | 35 | 2015 |
Modeling Deception In Information Security As A Hypergame–A Primer CN Gutierrez, S Bagchi, H Mohammed, J Avery Proceedings of the 16th Annual Information Security Symposium, 41, 2015 | 14 | 2015 |
The case of using negative (deceiving) information in data protection M Almeshekah, E Spafford International Conference on Cyber Warfare and Security, 237, 2014 | 11 | 2014 |
Offensive deception in computing J Avery, M Almeshekah, E Spafford International Conference on Cyber Warfare and Security, 23, 2017 | 9 | 2017 |
Enhancing Passwords Security using Deceptive Covert Communication⋆ MH Almeshekah, MJ Atallah, EH Spafford International Conference on ICT Systems Security and Privacy Protection …, 2015 | 7 | 2015 |
Using Deceptive Information in Computer Security Defenses MH Almeshekah, EH Spafford International Journal of Cyber Warfare and Terrorism 4 (3), 46-58, 2014 | 7 | 2014 |
A hypergame analysis for ersatzpasswords CN Gutierrez, MH Almeshekah, S Bagchi, EH Spafford ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International …, 2018 | 5 | 2018 |
Inhibiting and detecting offline password cracking using ErsatzPasswords CN Gutierrez, MH Almeshekah, EH Spafford, MJ Atallah, J Avery ACM Transactions on Privacy and Security (TOPS) 19 (3), 1-30, 2016 | 5 | 2016 |
Back Channels Can Be Useful!–Layering Authentication Channels to Provide Covert Communication MH Almeshekah, M Atallah, EH Spafford Security Protocols XXI, 189-195, 2013 | 5 | 2013 |
Proposal for better revocation model of SSL certificates M Almeshekah Mozilla Foundation, 2013 | 4 | 2013 |
Using deception to enhance security MH Almeshekah Purdue University West Lafayette, PhD Dissertation, 2015 | 3 | 2015 |
ErsatzPasswords–Ending Password Cracking MH Almeshekah, CN Gutierrez, MJ Atallah, EH Spafford | 3 | 2015 |
Defending against Password Exposure using Deceptive Covert Communication MH Almeshekah, MJ Atallah, EH Spafford | 1 | 2015 |
Layering authentication channels to provide covert communication MH Almeshekah, MJ Atallah, EH Spafford Proceedings of the 14th Annual Information Security Symposium, 1, 2013 | 1 | 2013 |
CERIAS Tech Report 2015-11 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses MH Almeshekah | | 2015 |
ErsatzPasswords: ending password cracking CN Gutierrez, MH Almeshekah, MJ Atallah, EH Spafford Proceedings of the 16th Annual Information Security Symposium, 1-1, 2015 | | 2015 |