Zubair Baig
Deakin University
H-index: 33
Oceania-Australia
Top articles of Zubair Baig
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning | Merwa Mehmood Zubair Baig Naeem Syed | 2024/2/16 | |
Inventive Systems and Control | V Suma Zubair Baig Selvanayaki Kolandapalayam Shanmugam Pascal Lorenz | 2023 | |
Intrusion Detection for Time-Series IoT Data with Recurrent Neural Networks and Feature Selection | Authorea Preprints | Naeem Firdous Syed Meng Meng Ge Zubair Baig | 2023/10/30 |
Inventive Systems and Control: Proceedings of ICISC 2023 | Proceedings of ICISC | V Suma Zubair Baig Selvanayaki Kolandapalayam Shanmugam Pascal Lorenz | 2023 |
DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm | Sri Harsha Mekala Zubair Baig Adnan Anwar Naeem Syed | 2023/9/11 | |
Privacy for IoT: informed consent management in smart buildings | Future Generation of Computing Systems | C. Pathmabandu John C. Grundy M.B. Chhetri Z. Baig | 2023/8/1 |
Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions | Sri Harsha Mekala Zubair Baig Adnan Anwar Sherali Zeadally | 2023/6/25 | |
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks | Computer Networks | Naeem Firdous Syed Mengmeng Ge Zubair Baig | 2023/4/1 |
Ransomware attacks of the COVID-19 pandemic: Novel strains, victims, and threat actors | IT Professional | Zubair Baig Sri Harsha Mekala Sherali Zeadally | 2023/11/3 |
Securing the smart city airspace: Drone cyber attack detection through machine learning | Future Internet | Zubair Baig Naeem Syed Nazeeruddin Mohammad | 2022/6/30 |
Unsupervised machine learning for drone forensics through flight path analysis | Naeem Syed Majid Ali Khan Nazeeruddin Mohammad Ghassen Ben Brahim Zubair Baig | 2022/6/6 | |
Zero trust architecture (zta): A comprehensive survey | Naeem Firdous Syed Syed W Shah Arash Shaghaghi Adnan Anwar Zubair Baig | 2022/5/12 | |
Industrial Internet of Things (IIoT): Testbed and Datasets for CyberSecurity and Digital Forensics | Sri Harsha Mekala Zubair Baig Adnan Anwar | 2022/12/23 | |
Drone forensics and machine learning: Sustaining the investigation process | Zubair Baig Majid Ali Khan Nazeeruddin Mohammad Ghassen Ben Brahim | 2022/4/18 | |
SPT-IoT 2022: 6th Workshop on Security, Privacy and Trust in the Internet of Things-Welcome and Committees: Welcome Message | Robin Ram Mohan Doss TA Zia DC Ranasinghe Z Baig L Pan | 2022/10/12 | |
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions | Applied Cybersecurity & Internet Governance | Erwin Adi Zubair Baig Sherali Zeadally | 2022 |
A decentralised blockchain-based secure authentication scheme for IoT devices | Effra Altaf Haqani Zubair Baig Frank Jiang | 2022/8/2 | |
Smart Data Intelligence Proceedings of ICSMDI 2022 | Proceedings of ICSMDI | R Asokan Diego P Ruiz Zubair A Baig Selwyn Piramuthu | 2022 |
Proceedings of International Conference on Sustainable Expert Systems: ICSES 2020 | Subarna Shakya Valentina Emilia Balas Wang Haoxiang Zubair Baig | 2021/3/30 | |
Securing contemporary eHealth architectures: Techniques and methods | Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications | Naeem F Syed Zubair Baig Adnan Anwar | 2021/12/21 |