Follow
Naeem Firdous Syed
Naeem Firdous Syed
Lecturer Cyber Security - Deakin University
Verified email at deakin.edu.au
Title
Cited by
Cited by
Year
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
3372017
Deep Learning-based Intrusion Detection for IoT Networks
M Ge, X Fu, N Syed, Z Baig, G Teo, A Robles-Kelly.
PRDC2019, 2019
2542019
Towards a deep learning-driven intrusion detection approach for Internet of Things
M Ge, NF Syed, X Fu, Z Baig, A Robles-Kelly
Computer Networks 186, 107784, 2021
1612021
Zero trust architecture (zta): A comprehensive survey
NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
IEEE access 10, 57143-57179, 2022
1402022
Denial of service attack detection through machine learning for the IoT
NF Syed, Z Baig, A Ibrahim, C Valli
Journal of Information and Telecommunication, 2020
1362020
Averaged dependence estimators for DoS attack detection in IoT networks
ZA Baig, S Sanguanpong, SN Firdous, TG Nguyen, C So-In
Future Generation Computer Systems 102, 198-209, 2020
1142020
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
IEEE International Conference on Internet of Things (iThings) and IEEE Green …, 2017
1132017
Traceability in supply chains: A Cyber security analysis
NF Syed, SW Shah, R Trujillo-Rasua, R Doss
Computers & Security 112, 102536, 2022
492022
LCDA: lightweight continuous device-to-device authentication for a zero trust architecture (ZTA)
SW Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
Computers & Security 108, 102351, 2021
472021
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks
NF Syed, M Ge, Z Baig
Computer Networks 225, 109662, 2023
412023
Securing the smart city airspace: Drone cyber attack detection through machine learning
Z Baig, N Syed, N Mohammad
Future Internet 14 (7), 205, 2022
282022
XMPP architecture and security challenges in an IoT ecosystem
MI Malik, IN McAteer, P Hannay, SN Firdous, Z Baig
Security Research Institute, Edith Cowan University, 2018
122018
Towards a lightweight continuous authentication protocol for device-to-device communication
SWA Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
112020
An entropy and volume-based approach for identifying malicious activities in honeynet traffic
MH Sqalli, SN Firdous, Z Baig, F Azzedin
2011 International Conference on Cyberworlds, 23-30, 2011
102011
IoT-MQTT based denial of service attack modelling and detection
NF Syed
Edith Cowan University, 2020
92020
Classifying malicious activities in Honeynets using entropy and volume‐based thresholds
MH Sqalli, SN Firdous, K Salah, M Abu‐Amara
Security and Communication Networks 6 (5), 567-583, 2013
42013
Unsupervised machine learning for drone forensics through flight path analysis
N Syed, MA Khan, N Mohammad, GB Brahim, Z Baig
2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2022
32022
A reliable peer-to-peer protocol for mobile ad-hoc wireless networks
MA Al-Mouhamed, IA Khan, SN Firdous
2011 9th IEEE/ACS International Conference on Computer Systems and …, 2011
32011
Identifying network traffic features suitable for honeynet data analysis
MH Sqalli, SN Firdous, K Salah, M Abu-Amara
2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE …, 2011
22011
Evaluation and Analysis of a Digital Forensic Readiness Framework for the IIoT
SH Mekala, Z Baig, A Anwar, N Syed
2024 12th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20