This page has only limited features, please log in for full access.

Dr. Dania Aljeaid
king AbdulAziz University ,Jeddah ,Saudi Arabia

Basic Info


Research Keywords & Expertise

0 Security Analysis
0 security and privacy protection
0 SECURITY ALGORITHMS
0 Cyber Attack
0 Security & Privacy

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

Dr. Dania Aljeaid is an assistant professor of cybersecurity at Faculty of Computer and Information Technology, King Abdulaziz University. She received the Ph.D. degree from Nottingham Trent University, UK in 2016 and the M.Sc. degree from South Wales University, UK in 2010. Her research interests span multiple areas including cybersecurity, privacy and protection, authentication protocols, cryptography, and cyber forensics.

Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 25 November 2020 in Information
Reads 0
Downloads 0

Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques. Usually, an attacker uses trickery as well as fraudulent and disguised means to steal valuable personal information or to deceive the victim into running malicious code, thereby gaining access and controlling the victim’s systems. This study focuses on evaluating the level of cybersecurity knowledge and cyber awareness in Saudi Arabia. It is aimed at assessing end-user susceptibility through three phishing attack simulations. Furthermore, we elaborate on some of the concepts related to phishing attacks and review the steps required to launch such attacks. Subsequently, we briefly discuss the tools and techniques associated with each attack simulation. Finally, a comprehensive analysis is conducted to assess and evaluate the results.

ACS Style

Dania Aljeaid; Amal Alzhrani; Mona Alrougi; Oroob Almalki. Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks. Information 2020, 11, 547 .

AMA Style

Dania Aljeaid, Amal Alzhrani, Mona Alrougi, Oroob Almalki. Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks. Information. 2020; 11 (12):547.

Chicago/Turabian Style

Dania Aljeaid; Amal Alzhrani; Mona Alrougi; Oroob Almalki. 2020. "Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks." Information 11, no. 12: 547.

Journal article
Published: 13 October 2020 in Sustainability
Reads 0
Downloads 0

An emerging technology with a secure and a decentralized nature, blockchain has the potential to transform conventional practices in an efficient and dynamic manner. However, migrating to blockchain can be challenging due to the complexity of its infrastructure and processes. The complexity of building applications on blockchain has been highlighted by many studies, thus stressing the need to investigate practical solutions further. A commonly known software engineering concept, software design pattern contributes to the acceleration of software development. It offers a holistic reusable solution for commonly occurring problems in a given context. It helps to identify problems that occur repetitively and describes best practices to address them. The present study is one of the first investigations to inquire into design patterns for blockchain application. Seeking to reduce the complexity in understanding and building applications on blockchain, this paper identifies a design pattern elicitation framework from similar blockchain applications. Next, it provides a demonstration of the Proof of Integrity (PoI) pattern elicited from two different applications on the blockchain. The applicability of the pattern is evaluated by building a blockchain application to verify the integrity of the academic certificates and by explaining how this integrity has been achieved empirically.

ACS Style

Kawther Saeedi; Monirah Almalki; Dania Aljeaid; Anna Visvizi; Muhammad Aslam. Design Pattern Elicitation Framework for Proof of Integrity in Blockchain Applications. Sustainability 2020, 12, 8404 .

AMA Style

Kawther Saeedi, Monirah Almalki, Dania Aljeaid, Anna Visvizi, Muhammad Aslam. Design Pattern Elicitation Framework for Proof of Integrity in Blockchain Applications. Sustainability. 2020; 12 (20):8404.

Chicago/Turabian Style

Kawther Saeedi; Monirah Almalki; Dania Aljeaid; Anna Visvizi; Muhammad Aslam. 2020. "Design Pattern Elicitation Framework for Proof of Integrity in Blockchain Applications." Sustainability 12, no. 20: 8404.

Conference paper
Published: 05 December 2019 in Communications in Computer and Information Science
Reads 0
Downloads 0

Blockchain is inventive technology that allows passing information without the need for third party or transaction cost. It offers solid properties such as decentralization, transparency, and immutability which make it desirable to adopt in sense of sharing data and maintain its security. However, with the emergence of blockchain technology, new issues have arisen with regards to security in the blockchain authentication and infrastructure. This paper focusing on understanding blockchain and what limitation and challenges adhered with it. Moreover, it reviews and analyzes the different authentication methods and discuss the integration of Identity-based encryption (IBE) and how does it differ than public key infrastructure (PKI) to determine the best method.

ACS Style

Lujain Alharbi; Dania Aljeaid. A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption. Communications in Computer and Information Science 2019, 69 -81.

AMA Style

Lujain Alharbi, Dania Aljeaid. A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption. Communications in Computer and Information Science. 2019; ():69-81.

Chicago/Turabian Style

Lujain Alharbi; Dania Aljeaid. 2019. "A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption." Communications in Computer and Information Science , no. : 69-81.

Journal article
Published: 01 January 2015 in International Journal of Advanced Research in Artificial Intelligence
Reads 0
Downloads 0

This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviours together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay.

ACS Style

Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. Analysis of Security Protocols using Finite-State Machines. International Journal of Advanced Research in Artificial Intelligence 2015, 4, 1 .

AMA Style

Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen. Analysis of Security Protocols using Finite-State Machines. International Journal of Advanced Research in Artificial Intelligence. 2015; 4 (4):1.

Chicago/Turabian Style

Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. 2015. "Analysis of Security Protocols using Finite-State Machines." International Journal of Advanced Research in Artificial Intelligence 4, no. 4: 1.

Conference paper
Published: 01 August 2014 in 2014 Science and Information Conference
Reads 0
Downloads 0

Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols.

ACS Style

Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. Biometric identity-based cryptography for e-Government environment. 2014 Science and Information Conference 2014, 581 -588.

AMA Style

Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen. Biometric identity-based cryptography for e-Government environment. 2014 Science and Information Conference. 2014; ():581-588.

Chicago/Turabian Style

Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. 2014. "Biometric identity-based cryptography for e-Government environment." 2014 Science and Information Conference , no. : 581-588.

Journal article
Published: 01 January 2014 in International Journal of Advanced Research in Artificial Intelligence
Reads 0
Downloads 0
ACS Style

Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. Modelling and Simulation of a Biometric Identity-Based Cryptography. International Journal of Advanced Research in Artificial Intelligence 2014, 3, 1 .

AMA Style

Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen. Modelling and Simulation of a Biometric Identity-Based Cryptography. International Journal of Advanced Research in Artificial Intelligence. 2014; 3 (10):1.

Chicago/Turabian Style

Dania Aljeaid; Xiaoqi Ma; Caroline Langensiepen. 2014. "Modelling and Simulation of a Biometric Identity-Based Cryptography." International Journal of Advanced Research in Artificial Intelligence 3, no. 10: 1.