Zubair Baig
Zubair Baig
Senior Lecturer, Cyber-Security, Deakin University, Melbourne, Australia
Verified email at deakin.edu.au
TitleCited byYear
Internet of things (iot): Research, simulators, and testbeds
M Chernyshev, Z Baig, O Bello, S Zeadally
IEEE Internet of Things Journal 5 (3), 1637-1647, 2017
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
ZA Baig
Computer Communications 34 (3), 468-484, 2011
An analysis of smart grid attacks and countermeasures
ZA Baig, AR Amoudi
Journal of Communications 8 (8), 473-479, 2013
Ransomware: Emergence of the Cyber Extortion Menace
N Hampton, Z Baig
SRI Security Congress, 2015
GMDH-based networks for intelligent intrusion detection
ZA Baig, SM Sait, AR Shaheen
Engineering Applications of Artificial Intelligence 26 (7), 1731-1740, 2013
Multi-agent systems for protecting critical infrastructures: A survey
ZA Baig
Journal of Network and Computer Applications 35 (3), 1151-1161, 2012
Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks
M Baqer, AI Khan, ZA Baig
International Conference on Embedded and Ubiquitous Computing, 208-217, 2005
Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures
ZA Baig, F Binbeshr
2013 International Conference on Cloud Computing and Big Data, 346-353, 2013
Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks
ZA Baig, SM Sait, F Binbeshr
Computer Networks 97, 31-47, 2016
A pattern recognition scheme for distributed denial of service (ddos) attacks in wireless sensor networks
ZA Baig, M Baqer, AI Khan
18th International Conference on Pattern Recognition (ICPR'06) 3, 1050-1054, 2006
Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy
TG Nguyen, C So-In, ZA Baig, S Sanguanpong
IEEE Access 6, 23406-23419, 2018
Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services
E Adi, Z Baig, P Hingston
Journal of Network and Computer Applications 91, 1-13, 2017
Modelling and evaluation of malicious attacks against the iot mqtt protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
Security attacks and solutions in electronic health (e-health) systems
S Zeadally, JT Isaac, Z Baig
Journal of medical systems 40 (12), 263, 2016
On the use of pattern matching for rapid anomaly detection in smart grid infrastructures
ZA Baig
2011 IEEE International Conference on Smart Grid Communications …, 2011
Ransomware behavioural analysis on windows platforms
N Hampton, Z Baig, S Zeadally
Journal of information security and applications 40, 44-51, 2018
Distributed denial-of-service attacks against http/2 services
E Adi, ZA Baig, P Hingston, CP Lam
Cluster Computing 19 (1), 79-86, 2016
Distributed denial of service attack detection in wireless sensor networks
ZA Baig, AI Khan
Monash University, 2008
Real-time QoS-aware video streaming: a comparative and experimental study
B Al-Madani, A Al-Roubaiey, ZA Baig
Advances in Multimedia 2014, 2014
The system can't perform the operation now. Try again later.
Articles 1–20