Planning and integrating deception into computer security defenses MH Almeshekah, EH Spafford Proceedings of the 2014 New Security Paradigms Workshop, 127-138, 2014 | 126 | 2014 |
Cyber security deception MH Almeshekah, EH Spafford Cyber Deception, 23-50, 2016 | 95 | 2016 |
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage MH Almeshekah, CN Gutierrez, MJ Atallah, EH Spafford Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 48 | 2015 |
Improving Security using Deception MH Almeshekah, EH Spafford, M Atallah Technical Report CERIAS Tech Report 2013-13, Center for Education and …, 2013 | 40 | 2013 |
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses MH Almeshekah PURDUE UNIVERSITY, 2015 | 36 | 2015 |
Modeling Deception In Information Security As A Hypergame–A Primer CN Gutierrez, S Bagchi, H Mohammed, J Avery Proceedings of the 16th Annual Information Security Symposium, 41, 2015 | 12 | 2015 |
The case of using negative (deceiving) information in data protection M Almeshekah, E Spafford International Conference on Cyber Warfare and Security, 237, 2014 | 11 | 2014 |
Enhancing Passwords Security using Deceptive Covert Communication⋆ MH Almeshekah, MJ Atallah, EH Spafford International Conference on ICT Systems Security and Privacy Protection …, 2015 | 8 | 2015 |
Using Deceptive Information in Computer Security Defenses MH Almeshekah, EH Spafford International Journal of Cyber Warfare and Terrorism 4 (3), 46-58, 2014 | 6 | 2014 |
Offensive deception in computing J Avery, M Almeshekah, E Spafford International Conference on Cyber Warfare and Security, 23, 2017 | 5 | 2017 |
Back Channels Can Be Useful!–Layering Authentication Channels to Provide Covert Communication MH Almeshekah, M Atallah, EH Spafford Security Protocols XXI, 189-195, 2013 | 5 | 2013 |
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords CN Gutierrez, MH Almeshekah, EH Spafford, MJ Atallah, J Avery ACM Transactions on Privacy and Security (TOPS) 19 (3), 9, 2016 | 4 | 2016 |
A Hypergame Analysis for ErsatzPasswords CN Gutierrez, MH Almeshekah, S Bagchi, EH Spafford IFIP International Conference on ICT Systems Security and Privacy Protection …, 2018 | 3 | 2018 |
Using deception to enhance security MH Almeshekah Purdue University West Lafayette, PhD Dissertation, 2015 | 3 | 2015 |
ErsatzPasswords–Ending Password Cracking MH Almeshekah, CN Gutierrez, MJ Atallah, EH Spafford | 3 | 2015 |
Proposal for better revocation model of SSL certificates M Almeshekah Mozilla Foundation, 2013 | 3 | 2013 |
Defending against Password Exposure using Deceptive Covert Communication MH Almeshekah, MJ Atallah, EH Spafford | 1 | 2015 |
Layering authentication channels to provide covert communication MH Almeshekah, MJ Atallah, EH Spafford Proceedings of the 14th Annual Information Security Symposium, 9, 2013 | 1 | 2013 |
CERIAS Tech Report 2015-11 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses MH Almeshekah | | 2015 |
ErsatzPasswords: ending password cracking CN Gutierrez, MH Almeshekah, MJ Atallah, EH Spafford Proceedings of the 16th Annual Information Security Symposium, 37, 2015 | | 2015 |