Zubair Baig
Zubair Baig
Associate Professor, Cyber-Security, Deakin University, Melbourne, Australia
Verified email at
Cited by
Cited by
Internet of things (iot): Research, simulators, and testbeds
M Chernyshev, Z Baig, O Bello, S Zeadally
IEEE Internet of Things Journal 5 (3), 1637-1647, 2017
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
Machine learning and data analytics for the IoT
E Adi, A Anwar, Z Baig, S Zeadally
Neural computing and applications 32 (20), 16205-16233, 2020
Ransomware behavioural analysis on windows platforms
N Hampton, Z Baig, S Zeadally
Journal of information security and applications 40, 44-51, 2018
Deep learning-based intrusion detection for IoT networks
M Ge, X Fu, N Syed, Z Baig, G Teo, A Robles-Kelly
2019 IEEE 24th pacific rim international symposium on dependable computing …, 2019
Modelling and evaluation of malicious attacks against the iot mqtt protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics
S Zeadally, F Siddiqui, Z Baig, A Ibrahim
PSU research review, 2019
Ransomware: Emergence of the Cyber Extortion Menace
N Hampton, Z Baig
SRI Security Congress, 2015
Harnessing artificial intelligence capabilities to improve cybersecurity
S Zeadally, E Adi, Z Baig, IA Khan
Ieee Access 8, 23817-23837, 2020
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
ZA Baig
Computer Communications 34 (3), 468-484, 2011
Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks
TG Nguyen, TV Phan, BT Nguyen, C So-In, ZA Baig, S Sanguanpong
IEEE access 7, 107678-107694, 2019
An Analysis of Smart Grid Attacks and Countermeasures.
ZA Baig, AR Amoudi
J. Commun. 8 (8), 473-479, 2013
Healthcare data breaches: Implications for digital forensic readiness
M Chernyshev, S Zeadally, Z Baig
Journal of medical systems 43 (1), 1-12, 2019
GMDH-based networks for intelligent intrusion detection
ZA Baig, SM Sait, AR Shaheen
Engineering Applications of Artificial Intelligence 26 (7), 1731-1740, 2013
Security attacks and solutions in electronic health (e-health) systems
S Zeadally, JT Isaac, Z Baig
Journal of medical systems 40 (12), 1-12, 2016
Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy
TG Nguyen, C So-In, ZA Baig, S Sanguanpong
IEEE Access 6, 23406-23419, 2018
Averaged dependence estimators for DoS attack detection in IoT networks
ZA Baig, S Sanguanpong, SN Firdous, TG Nguyen, C So-In
Future Generation Computer Systems 102, 198-209, 2020
Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures
SN Islam, Z Baig, S Zeadally
IEEE Transactions on Industrial Informatics 15 (12), 6522-6530, 2019
Mobile forensics: advances, challenges, and research opportunities
M Chernyshev, S Zeadally, Z Baig, A Woodward
IEEE Security & Privacy 15 (6), 42-51, 2017
Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks
ZA Baig, SM Sait, F Binbeshr
Computer Networks 97, 31-47, 2016
The system can't perform the operation now. Try again later.
Articles 1–20