This page has only limited features, please log in for full access.
Dr. Dania Aljeaid is an assistant professor of cybersecurity at Faculty of Computer and Information Technology, King Abdulaziz University. She received the Ph.D. degree from Nottingham Trent University, UK in 2016 and the M.Sc. degree from South Wales University, UK in 2010. Her research interests span multiple areas including cybersecurity, privacy and protection, authentication protocols, cryptography, and cyber forensics.
Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques. Usually, an attacker uses trickery as well as fraudulent and disguised means to steal valuable personal information or to deceive the victim into running malicious code, thereby gaining access and controlling the victim’s systems. This study focuses on evaluating the level of cybersecurity knowledge and cyber awareness in Saudi Arabia. It is aimed at assessing end-user susceptibility through three phishing attack simulations. Furthermore, we elaborate on some of the concepts related to phishing attacks and review the steps required to launch such attacks. Subsequently, we briefly discuss the tools and techniques associated with each attack simulation. Finally, a comprehensive analysis is conducted to assess and evaluate the results.
Dania Aljeaid; Amal Alzhrani; Mona Alrougi; Oroob Almalki. Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks. Information 2020, 11, 547 .
AMA StyleDania Aljeaid, Amal Alzhrani, Mona Alrougi, Oroob Almalki. Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks. Information. 2020; 11 (12):547.
Chicago/Turabian StyleDania Aljeaid; Amal Alzhrani; Mona Alrougi; Oroob Almalki. 2020. "Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks." Information 11, no. 12: 547.
An emerging technology with a secure and a decentralized nature, blockchain has the potential to transform conventional practices in an efficient and dynamic manner. However, migrating to blockchain can be challenging due to the complexity of its infrastructure and processes. The complexity of building applications on blockchain has been highlighted by many studies, thus stressing the need to investigate practical solutions further. A commonly known software engineering concept, software design pattern contributes to the acceleration of software development. It offers a holistic reusable solution for commonly occurring problems in a given context. It helps to identify problems that occur repetitively and describes best practices to address them. The present study is one of the first investigations to inquire into design patterns for blockchain application. Seeking to reduce the complexity in understanding and building applications on blockchain, this paper identifies a design pattern elicitation framework from similar blockchain applications. Next, it provides a demonstration of the Proof of Integrity (PoI) pattern elicited from two different applications on the blockchain. The applicability of the pattern is evaluated by building a blockchain application to verify the integrity of the academic certificates and by explaining how this integrity has been achieved empirically.
Kawther Saeedi; Monirah Almalki; Dania Aljeaid; Anna Visvizi; Muhammad Aslam. Design Pattern Elicitation Framework for Proof of Integrity in Blockchain Applications. Sustainability 2020, 12, 8404 .
AMA StyleKawther Saeedi, Monirah Almalki, Dania Aljeaid, Anna Visvizi, Muhammad Aslam. Design Pattern Elicitation Framework for Proof of Integrity in Blockchain Applications. Sustainability. 2020; 12 (20):8404.
Chicago/Turabian StyleKawther Saeedi; Monirah Almalki; Dania Aljeaid; Anna Visvizi; Muhammad Aslam. 2020. "Design Pattern Elicitation Framework for Proof of Integrity in Blockchain Applications." Sustainability 12, no. 20: 8404.
Blockchain is inventive technology that allows passing information without the need for third party or transaction cost. It offers solid properties such as decentralization, transparency, and immutability which make it desirable to adopt in sense of sharing data and maintain its security. However, with the emergence of blockchain technology, new issues have arisen with regards to security in the blockchain authentication and infrastructure. This paper focusing on understanding blockchain and what limitation and challenges adhered with it. Moreover, it reviews and analyzes the different authentication methods and discuss the integration of Identity-based encryption (IBE) and how does it differ than public key infrastructure (PKI) to determine the best method.
Lujain Alharbi; Dania Aljeaid. A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption. Communications in Computer and Information Science 2019, 69 -81.
AMA StyleLujain Alharbi, Dania Aljeaid. A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption. Communications in Computer and Information Science. 2019; ():69-81.
Chicago/Turabian StyleLujain Alharbi; Dania Aljeaid. 2019. "A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption." Communications in Computer and Information Science , no. : 69-81.
This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviours together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay.
Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. Analysis of Security Protocols using Finite-State Machines. International Journal of Advanced Research in Artificial Intelligence 2015, 4, 1 .
AMA StyleDania Aljeaid, Xiaoqi Ma, Caroline Langensiepen. Analysis of Security Protocols using Finite-State Machines. International Journal of Advanced Research in Artificial Intelligence. 2015; 4 (4):1.
Chicago/Turabian StyleDania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. 2015. "Analysis of Security Protocols using Finite-State Machines." International Journal of Advanced Research in Artificial Intelligence 4, no. 4: 1.
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols.
Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. Biometric identity-based cryptography for e-Government environment. 2014 Science and Information Conference 2014, 581 -588.
AMA StyleDania Aljeaid, Xiaoqi Ma, Caroline Langensiepen. Biometric identity-based cryptography for e-Government environment. 2014 Science and Information Conference. 2014; ():581-588.
Chicago/Turabian StyleDania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. 2014. "Biometric identity-based cryptography for e-Government environment." 2014 Science and Information Conference , no. : 581-588.
Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. Modelling and Simulation of a Biometric Identity-Based Cryptography. International Journal of Advanced Research in Artificial Intelligence 2014, 3, 1 .
AMA StyleDania Aljeaid, Xiaoqi Ma, Caroline Langensiepen. Modelling and Simulation of a Biometric Identity-Based Cryptography. International Journal of Advanced Research in Artificial Intelligence. 2014; 3 (10):1.
Chicago/Turabian StyleDania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. 2014. "Modelling and Simulation of a Biometric Identity-Based Cryptography." International Journal of Advanced Research in Artificial Intelligence 3, no. 10: 1.