Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Naeem Firdous SyedLecturer Cyber Security - Deakin UniversityVerified email at deakin.edu.au
Maxim ChernyshevPhD Candidate, Deakin UniversityVerified email at deakin.edu.au
Peter HannayEdith Cowan UniversityVerified email at ecu.edu.au
Erwin AdiDeloitte Technology and TransformationVerified email at deloitte.com.au
Craig ValliSafeNSecureCyberVerified email at safensecurecyber.com
Surasak SanguanpongAssoc. Professor, Computer Engineering, Kasetsart UniversityVerified email at ku.ac.th
Asad I. KhanSensor Analytics AustraliaVerified email at sensoranalytics.com.au
Khaled SalahKhalifa University of Science and TechnologyVerified email at ku.ac.ae
El-Sayed M. El-AlfyProfessor, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Follow![Zubair Baig](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=OJ1qXfUAAAAJ&citpid=10)
Zubair Baig
Associate Professor, Cyber-Security, Deakin University, Melbourne, Australia
Verified email at deakin.edu.au