Zubair Baig
Zubair Baig
Senior Lecturer, Cyber-Security, Deakin University, Melbourne, Australia
Verified email at deakin.edu.au
Title
Cited by
Cited by
Year
Internet of things (iot): Research, simulators, and testbeds
M Chernyshev, Z Baig, O Bello, S Zeadally
IEEE Internet of Things Journal 5 (3), 1637-1647, 2017
802017
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
612017
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
ZA Baig
Computer Communications 34 (3), 468-484, 2011
542011
An analysis of smart grid attacks and countermeasures
ZA Baig, AR Amoudi
Journal of Communications 8 (8), 473-479, 2013
462013
GMDH-based networks for intelligent intrusion detection
ZA Baig, SM Sait, AR Shaheen
Engineering Applications of Artificial Intelligence 26 (7), 1731-1740, 2013
412013
Ransomware: Emergence of the Cyber Extortion Menace
N Hampton, Z Baig
SRI Security Congress, 2015
402015
Multi-agent systems for protecting critical infrastructures: A survey
ZA Baig
Journal of Network and Computer Applications 35 (3), 1151-1161, 2012
322012
Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks
M Baqer, AI Khan, ZA Baig
International Conference on Embedded and Ubiquitous Computing, 208-217, 2005
312005
Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures
ZA Baig, F Binbeshr
2013 International Conference on Cloud Computing and Big Data, 346-353, 2013
292013
Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy
TG Nguyen, C So-In, ZA Baig, S Sanguanpong
IEEE Access 6, 23406-23419, 2018
282018
Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks
ZA Baig, SM Sait, F Binbeshr
Computer Networks 97, 31-47, 2016
272016
A pattern recognition scheme for distributed denial of service (ddos) attacks in wireless sensor networks
ZA Baig, M Baqer, AI Khan
18th International Conference on Pattern Recognition (ICPR'06) 3, 1050-1054, 2006
272006
Ransomware behavioural analysis on windows platforms
N Hampton, Z Baig, S Zeadally
Journal of information security and applications 40, 44-51, 2018
242018
Modelling and evaluation of malicious attacks against the iot mqtt protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
232017
Security attacks and solutions in electronic health (e-health) systems
S Zeadally, JT Isaac, Z Baig
Journal of medical systems 40 (12), 263, 2016
222016
Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services
E Adi, Z Baig, P Hingston
Journal of Network and Computer Applications 91, 1-13, 2017
212017
On the use of pattern matching for rapid anomaly detection in smart grid infrastructures
ZA Baig
2011 IEEE International Conference on Smart Grid Communications …, 2011
202011
Distributed denial-of-service attacks against http/2 services
E Adi, ZA Baig, P Hingston, CP Lam
Cluster Computing 19 (1), 79-86, 2016
192016
Distributed denial of service attack detection in wireless sensor networks
ZA Baig, AI Khan
Monash University, 2008
182008
Real-time QoS-aware video streaming: a comparative and experimental study
B Al-Madani, A Al-Roubaiey, ZA Baig
Advances in Multimedia 2014, 2014
172014
The system can't perform the operation now. Try again later.
Articles 1–20