Zubair Baig
Zubair Baig
Associate Professor, Cyber-Security, Deakin University, Melbourne, Australia
Verified email at
Cited by
Cited by
Internet of things (iot): Research, simulators, and testbeds
M Chernyshev, Z Baig, O Bello, S Zeadally
IEEE Internet of Things Journal 5 (3), 1637-1647, 2017
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
Machine learning and data analytics for the IoT
E Adi, A Anwar, Z Baig, S Zeadally
Neural computing and applications 32, 16205-16233, 2020
Deep learning-based intrusion detection for IoT networks
M Ge, X Fu, N Syed, Z Baig, G Teo, A Robles-Kelly
2019 IEEE 24th pacific rim international symposium on dependable computing …, 2019
Harnessing artificial intelligence capabilities to improve cybersecurity
S Zeadally, E Adi, Z Baig, IA Khan
Ieee Access 8, 23817-23837, 2020
Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics
S Zeadally, F Siddiqui, Z Baig, A Ibrahim
PSU research review 4 (2), 149-168, 2020
Ransomware behavioural analysis on windows platforms
N Hampton, Z Baig, S Zeadally
Journal of information security and applications 40, 44-51, 2018
Healthcare data breaches: Implications for digital forensic readiness
M Chernyshev, S Zeadally, Z Baig
Journal of medical systems 43, 1-12, 2019
Towards a deep learning-driven intrusion detection approach for Internet of Things
M Ge, NF Syed, X Fu, Z Baig, A Robles-Kelly
Computer Networks 186, 107784, 2021
Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks
TG Nguyen, TV Phan, BT Nguyen, C So-In, ZA Baig, S Sanguanpong
IEEE access 7, 107678-107694, 2019
Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures
SN Islam, Z Baig, S Zeadally
IEEE Transactions on Industrial Informatics 15 (12), 6522-6530, 2019
Denial of service attack detection through machine learning for the IoT
NF Syed, Z Baig, A Ibrahim, C Valli
Journal of Information and Telecommunication 4 (4), 482-503, 2020
Modelling and evaluation of malicious attacks against the iot mqtt protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
Averaged dependence estimators for DoS attack detection in IoT networks
ZA Baig, S Sanguanpong, SN Firdous, TG Nguyen, C So-In
Future Generation Computer Systems 102, 198-209, 2020
An Analysis of Smart Grid Attacks and Countermeasures.
ZA Baig, AR Amoudi
J. Commun. 8 (8), 473-479, 2013
Ransomware: Emergence of the Cyber Extortion Menace
N Hampton, Z Baig
SRI Security Congress, 2015
Security attacks and solutions in electronic health (e-health) systems
S Zeadally, JT Isaac, Z Baig
Journal of medical systems 40, 1-12, 2016
GMDH-based networks for intelligent intrusion detection
ZA Baig, SM Sait, AR Shaheen
Engineering Applications of Artificial Intelligence 26 (7), 1731-1740, 2013
Zero trust architecture (zta): A comprehensive survey
NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
IEEE Access 10, 57143-57179, 2022
25 years of bluetooth technology
S Zeadally, F Siddiqui, Z Baig
Future Internet 11 (9), 194, 2019
The system can't perform the operation now. Try again later.
Articles 1–20