Internet of things (iot): Research, simulators, and testbeds M Chernyshev, Z Baig, O Bello, S Zeadally IEEE Internet of Things Journal 5 (3), 1637-1647, 2017 | 351 | 2017 |
Harnessing artificial intelligence capabilities to improve cybersecurity S Zeadally, E Adi, Z Baig, IA Khan Ieee Access 8, 23817-23837, 2020 | 345 | 2020 |
Future challenges for smart cities: Cyber-security and digital forensics ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ... Digital Investigation 22, 3-13, 2017 | 342 | 2017 |
Machine learning and data analytics for the IoT E Adi, A Anwar, Z Baig, S Zeadally Neural computing and applications 32, 16205-16233, 2020 | 300 | 2020 |
Deep learning-based intrusion detection for IoT networks M Ge, X Fu, N Syed, Z Baig, G Teo, A Robles-Kelly 2019 IEEE 24th pacific rim international symposium on dependable computing …, 2019 | 266 | 2019 |
Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics S Zeadally, F Siddiqui, Z Baig, A Ibrahim PSU research review 4 (2), 149-168, 2020 | 190 | 2020 |
Towards a deep learning-driven intrusion detection approach for Internet of Things M Ge, NF Syed, X Fu, Z Baig, A Robles-Kelly Computer Networks 186, 107784, 2021 | 173 | 2021 |
Zero trust architecture (zta): A comprehensive survey NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss IEEE access 10, 57143-57179, 2022 | 157 | 2022 |
Healthcare data breaches: Implications for digital forensic readiness M Chernyshev, S Zeadally, Z Baig Journal of medical systems 43, 1-12, 2019 | 149 | 2019 |
Ransomware behavioural analysis on windows platforms N Hampton, Z Baig, S Zeadally Journal of information security and applications 40, 44-51, 2018 | 142 | 2018 |
Denial of service attack detection through machine learning for the IoT NF Syed, Z Baig, A Ibrahim, C Valli Journal of Information and Telecommunication 4 (4), 482-503, 2020 | 141 | 2020 |
Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks TG Nguyen, TV Phan, BT Nguyen, C So-In, ZA Baig, S Sanguanpong IEEE access 7, 107678-107694, 2019 | 134 | 2019 |
Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures SN Islam, Z Baig, S Zeadally IEEE Transactions on Industrial Informatics 15 (12), 6522-6530, 2019 | 130 | 2019 |
Averaged dependence estimators for DoS attack detection in IoT networks ZA Baig, S Sanguanpong, SN Firdous, TG Nguyen, C So-In Future Generation Computer Systems 102, 198-209, 2020 | 119 | 2020 |
Modelling and evaluation of malicious attacks against the iot mqtt protocol SN Firdous, Z Baig, C Valli, A Ibrahim 2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017 | 113 | 2017 |
Security attacks and solutions in electronic health (e-health) systems S Zeadally, JT Isaac, Z Baig Journal of medical systems 40, 1-12, 2016 | 97 | 2016 |
An analysis of smart grid attacks and countermeasures. ZA Baig, AR Amoudi J. Commun. 8 (8), 473-479, 2013 | 95 | 2013 |
Ransomware: Emergence of the Cyber Extortion Menace N Hampton, Z Baig SRI Security Congress, 2015 | 93 | 2015 |
25 years of bluetooth technology S Zeadally, F Siddiqui, Z Baig Future Internet 11 (9), 194, 2019 | 88 | 2019 |
GMDH-based networks for intelligent intrusion detection ZA Baig, SM Sait, AR Shaheen Engineering Applications of Artificial Intelligence 26 (7), 1731-1740, 2013 | 75 | 2013 |