Zubair A. Baig

Orcid: 0000-0002-9245-2703

According to our database1, Zubair A. Baig authored at least 80 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Role of Rule Mining in Generating Synthetic Cyber-Physical System Attack Samples.
IEEE Internet Things Mag., November, 2024

AI for Critical Infrastructure Security: Concepts, Challenges, and Future Directions.
IEEE Internet Things Mag., 2024

Provably secure optimal homomorphic signcryption for satellite-based internet of things.
Comput. Networks, 2024

Towards Large Language Model (LLM) Forensics Using LLM-based Invocation Log Analysis.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

Evaluation and Analysis of a Digital Forensic Readiness Framework for the IIoT.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Privacy for IoT: Informed consent management in Smart Buildings.
Future Gener. Comput. Syst., August, 2023

Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks.
Comput. Networks, April, 2023

Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors.
IT Prof., 2023

Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions.
Comput. Commun., 2023

DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023

2022
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning.
Future Internet, 2022

Zero Trust Architecture (ZTA): A Comprehensive Survey.
IEEE Access, 2022

Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

2021
A novel multi-stage distributed authentication scheme for smart meter communication.
PeerJ Comput. Sci., 2021

Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface.
Computer, 2021

LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021

Towards a deep learning-driven intrusion detection approach for Internet of Things.
Comput. Networks, 2021

ICME: an informed consent management engine for conformance in smart building environments.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Tracing Software Exploitation.
Proceedings of the Network and System Security - 15th International Conference, 2021

2020
Machine learning and data analytics for the IoT.
Neural Comput. Appl., 2020

Denial of service attack detection through machine learning for the IoT.
J. Inf. Telecommun., 2020

Averaged dependence estimators for DoS attack detection in IoT networks.
Future Gener. Comput. Syst., 2020

Toward a Deep Learning-Driven Intrusion Detection Approach for Internet of Things.
CoRR, 2020

Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity.
IEEE Access, 2020

An Automated Method for Detection and Enumeration of Olive Trees Through Remote Sensing.
IEEE Access, 2020

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020

An informed consent model for managing the privacy paradox in smart buildings.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

Digital Forensics for Drones: A Study of Tools and Techniques.
Proceedings of the Applications and Techniques in Information Security, 2020

2019
Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures.
IEEE Trans. Ind. Informatics, 2019

Editorial: Sustainable Mobile Networks and its Applications.
Mob. Networks Appl., 2019

Healthcare Data Breaches: Implications for Digital Forensic Readiness.
J. Medical Syst., 2019

25 Years of Bluetooth Technology.
Future Internet, 2019

Introduction to the Special Section on Software Engineering for Intelligent Systems and Control.
Comput. Electr. Eng., 2019

On Secure Wireless Sensor Networks With Cooperative Energy Harvesting Relaying.
IEEE Access, 2019

SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks.
IEEE Access, 2019

Deep Learning-Based Intrusion Detection for IoT Networks.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Digital Forensics for Drone Data - Intelligent Clustering Using Self Organising Maps.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

2018
Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone.
J. Digit. Forensics Secur. Law, 2018

Internet of Things Forensics: The Need, Process Models, and Open Issues.
IT Prof., 2018

Ransomware behavioural analysis on windows platforms.
J. Inf. Secur. Appl., 2018

Internet of Things (IoT): Research, Simulators, and Testbeds.
IEEE Internet Things J., 2018

A novel approach for face recognition using fused GMDH-based networks.
Int. Arab J. Inf. Technol., 2018

Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy.
IEEE Access, 2018

Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-m Fading.
IEEE Access, 2018

Preparing for Secure Wireless Medical Environment in 2050: A Vision.
IEEE Access, 2018

2017
Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services.
J. Netw. Comput. Appl., 2017

Mobile Forensics: Advances, Challenges, and Research Opportunities.
IEEE Secur. Priv., 2017

Future challenges for smart cities: Cyber-security and digital forensics.
Digit. Investig., 2017

Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

2016
Security Attacks and Solutions in Electronic Health (E-health) Systems.
J. Medical Syst., 2016

Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks.
Comput. Networks, 2016

Distributed denial-of-service attacks against HTTP/2 services.
Clust. Comput., 2016

Timestamp Analysis for Quality Validation of Network Forensic Data.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Controlled Android Application Execution for the IoT Infrastructure.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

Low-Rate Denial-of-Service Attacks against HTTP/2 Services.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2014
Real-Time QoS-Aware Video Streaming: A Comparative and Experimental Study.
Adv. Multim., 2014

2013
An Analysis of Smart Grid Attacks and Countermeasures.
J. Commun., 2013

GMDH-based networks for intelligent intrusion detection.
Eng. Appl. Artif. Intell., 2013

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Multi-agent systems for protecting critical infrastructures: A survey.
J. Netw. Comput. Appl., 2012

Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching.
Int. J. Secur. Networks, 2012

Video-on-Demand (VoD) deployment over hospitality networks.
Int. J. Netw. Manag., 2012

Abductive Neural Network Modeling for Hand Recognition Using Geometric Features.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

2011
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks.
Comput. Commun., 2011

An AODE-based intrusion detection system for computer networks.
Proceedings of the 2011 World Congress on Internet Security, 2011

On the use of pattern matching for rapid anomaly detection in smart grid infrastructures.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

A selective parameter-based evolutionary technique for network intrusion detection.
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

A trust-based mechanism for protecting IPv6 networks against stateless address auto-configuration attacks.
Proceedings of the 17th IEEE International Conference on Networks, 2011

An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.
Proceedings of the 2011 International Conference on Cyberworlds, 2011

2010
Discovering last-matching rules in popular open-source and commercial firewalls.
Int. J. Internet Protoc. Technol., 2010

Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks.
IET Inf. Secur., 2010

On the use of Unified And-Or fuzzy operator for distributed node exhaustion attack decision-making in wireless sensor networks.
Proceedings of the FUZZ-IEEE 2010, 2010

2009
Resiliency of open-source firewalls against remote discovery of last-matching rules.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

2007
A Simulated Evolution-Tabu search hybrid metaheuristic for routing in computer networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

SGSIA-in-Network Data Preprocessing for Secure Grid-Sensor Integration.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

2005
Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Preventing Service Flooding on Internet DNS Servers thru an Application-Level Mechanism: A Performance Analysis.
Proceedings of The 2005 International Conference on Security and Management, 2005


  Loading...