Zubair A. Baig
Orcid: 0000-0002-9245-2703
According to our database1,
Zubair A. Baig
authored at least 80 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The Role of Rule Mining in Generating Synthetic Cyber-Physical System Attack Samples.
IEEE Internet Things Mag., November, 2024
AI for Critical Infrastructure Security: Concepts, Challenges, and Future Directions.
IEEE Internet Things Mag., 2024
Provably secure optimal homomorphic signcryption for satellite-based internet of things.
Comput. Networks, 2024
Towards Large Language Model (LLM) Forensics Using LLM-based Invocation Log Analysis.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Future Gener. Comput. Syst., August, 2023
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks.
Comput. Networks, April, 2023
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors.
IT Prof., 2023
Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions.
Comput. Commun., 2023
DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023
2022
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning.
Future Internet, 2022
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
2021
PeerJ Comput. Sci., 2021
Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface.
Computer, 2021
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021
Comput. Networks, 2021
ICME: an informed consent management engine for conformance in smart building environments.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Proceedings of the Network and System Security - 15th International Conference, 2021
2020
J. Inf. Telecommun., 2020
Future Gener. Comput. Syst., 2020
CoRR, 2020
IEEE Access, 2020
An Automated Method for Detection and Enumeration of Olive Trees Through Remote Sensing.
IEEE Access, 2020
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
Proceedings of the Applications and Techniques in Information Security, 2020
2019
Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures.
IEEE Trans. Ind. Informatics, 2019
Mob. Networks Appl., 2019
J. Medical Syst., 2019
Introduction to the Special Section on Software Engineering for Intelligent Systems and Control.
Comput. Electr. Eng., 2019
IEEE Access, 2019
SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks.
IEEE Access, 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
Digital Forensics for Drone Data - Intelligent Clustering Using Self Organising Maps.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019
2018
J. Digit. Forensics Secur. Law, 2018
IT Prof., 2018
IEEE Internet Things J., 2018
Int. Arab J. Inf. Technol., 2018
Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy.
IEEE Access, 2018
Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-m Fading.
IEEE Access, 2018
IEEE Access, 2018
2017
J. Netw. Comput. Appl., 2017
IEEE Secur. Priv., 2017
Digit. Investig., 2017
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
2016
J. Medical Syst., 2016
Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks.
Comput. Networks, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
2015
Proceedings of the Internet of Things. IoT Infrastructures, 2015
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
2014
Adv. Multim., 2014
2013
Eng. Appl. Artif. Intell., 2013
Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps.
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
J. Netw. Comput. Appl., 2012
Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching.
Int. J. Secur. Networks, 2012
Int. J. Netw. Manag., 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
2011
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks.
Comput. Commun., 2011
Proceedings of the 2011 World Congress on Internet Security, 2011
On the use of pattern matching for rapid anomaly detection in smart grid infrastructures.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011
A trust-based mechanism for protecting IPv6 networks against stateless address auto-configuration attacks.
Proceedings of the 17th IEEE International Conference on Networks, 2011
An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.
Proceedings of the 2011 International Conference on Cyberworlds, 2011
2010
Int. J. Internet Protoc. Technol., 2010
Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks.
IET Inf. Secur., 2010
On the use of Unified And-Or fuzzy operator for distributed node exhaustion attack decision-making in wireless sensor networks.
Proceedings of the FUZZ-IEEE 2010, 2010
2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
2007
A Simulated Evolution-Tabu search hybrid metaheuristic for routing in computer networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
2006
A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006
2005
Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Preventing Service Flooding on Internet DNS Servers thru an Application-Level Mechanism: A Performance Analysis.
Proceedings of The 2005 International Conference on Security and Management, 2005