Publications
Naeem Syed, Mengmeng Ge, Zubair Baig
(2023), Vol. 225, pp. 1-14, Computer Networks, Amsterdam, The Netherlands, C1
Traceability in Supply Chains: A Cyber Security Analysis
Naeem Syed, Syed Shah, Rolando Trujillo Rasua, Robin Doss
(2022), Vol. 112, Computers and Security, C1
Zero Trust Architecture (ZTA): A Comprehensive Survey
N Syed, S Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
(2022), Vol. 10, pp. 57143-57179, IEEE Access, Piscataway, N.J., C1
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
Z Baig, N Syed, N Mohammad
(2022), Vol. 14, pp. 1-19, Future Internet, Basel, Switzerland, C1
Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis
N Syed, M Khan, N Mohammad, G Brahim, Z Baig
(2022), ISDFS 2022 : International Symposium on Digital Forensics and Security 2022, Istanbul, Turkey, E1
Securing contemporary eHealth architectures: Techniques and methods
N Syed, Z Baig, A Anwar
(2021), pp. 207-234, Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, London, Eng., B1
Towards a deep learning-driven intrusion detection approach for Internet of Things
M Ge, N Syed, X Fu, Z Baig, A Robles-Kelly
(2021), Vol. 186, Computer Networks, C1
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
(2021), Vol. 108, Computers and Security, C1
Averaged dependence estimators for DoS attack detection in IoT networks
Z Baig, S Sanguanpong, S Firdous, V Vo, T Nguyen, C So-In
(2020), Vol. 102, pp. 198-209, Future Generation Computer Systems, C1
Denial of service attack detection through machine learning for the IoT
Naeem Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli
(2020), Vol. 4, pp. 482-503, Journal of information and telecommunication, Abingdon, Eng., C1
Towards a lightweight continuous authentication protocol for device-to-device communication
S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
(2020), pp. 1119-1126, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, E1
Bio-inspired cyber-security for the smart grid
Naeem Syed, Ahmed Ibrahim, Z Baig, Craig Valli
(2019), pp. 373-392, Nature-inspired cyber security and resiliency: fundamentals, techniques and applications, Stevenage, Eng., B1
Deep learning-based intrusion detection for IoT networks
Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, Antonio Robles-Kelly
(2019), pp. 256-265, PRDC 2019 : Proceedings of the 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing, Kyoto, Japan, E1
Future challenges for smart cities: cyber-security and digital forensics
Z Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, M Johnstone, P Kerai, A Ibrahim, K Sansurooah, N Syed, M Peacock
(2017), Vol. 22, pp. 3-13, Digital investigation, Amsterdam, The Netherlands, C1-1
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol
Syed Firdous, Zubair Baig, Craig Valli, Ahmed Ibrahim
(2017), pp. 748-755, Internet of Things-Green Computing-Cyber, Physical and Social Computing-SmartData 2017 : proceedings : 2017 Institute of Electrical and Electronics Engineers International Conference on Internet of Things, Institute of Electrical and Electronics Engineers Green Computing and Communications, Institute of Electrical and Electronics Engineers Cyber, Physical and Social Computing, Institute of Electrical and Electronics Engineers Smart Data : 21-23 June 2017, Exeter, United Kingdom, Exeter, England, E1-1
Classifying malicious activities in Honeynets using entropy and volume-based thresholds
M Sqalli, S Firdous, K Salah, M Abu-Amara
(2013), Vol. 6, pp. 567-583, Security and Communication Networks, C1-1
An entropy and volume-based approach for identifying malicious activities in honeynet traffic
M Sqalli, S Firdous, Z Baig, F Azzedin
(2011), pp. 23-30, Proceedings - 2011 International Conference on Cyberworlds, Cyberworlds 2011, Banff, CANADA, E1-1
A reliable peer-to-peer protocol for mobile ad-hoc wireless networks
M Al-Mouhamed, I Khan, S Firdous
(2011), pp. 32-37, Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, E1-1
Identifying network traffic features suitable for honeynet data analysis
M Sqalli, N Syed, K Salah, M Abu-Amara
(2011), pp. 001044-001048, Canadian Conference on Electrical and Computer Engineering, Niagara Falls, ON, Canada, E1-1
Funded Projects at Deakin
Industry and Other Funding
SummerTech
Dr Zubair Baig, Dr Muna Al-Hawawreh, Dr Jesse Laeuchli, Dr Naeem Syed, Dr Anh Dinh
Victorian Chamber of Commerce and Industry
- 2023: $66,000
Other Funding Sources
Socrates: Software Security with a focus on critical technologies.
Dr Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, Dr Lennon Chang, A/Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang
Cyber Security Research Centre Limited
- 2023: $90,732
Supervisions
No completed student supervisions to report