Dr Zubair Baig

STAFF PROFILE

Position

Senior Lecturer, Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Qualifications

Doctor of Philosophy, Monash University, 2008
Master of Science, University of Maryland, 2003
Bachelor of Science, King Fahd Uni of Pet. and Min., 2002

Contact

zubair.baig@deakin.edu.au
+61 3 522 73525

Biography

ZUBAIR BAIG is currently a Senior Lecturer in Cyber Security with the School of Information Technology, Deakin University, Geelong, VIC, Australia. He has authored/coauthored over 80 journal and conference papers and book chapters. His research interests are in the areas of cyber-security, the IoT, artificial intelligence, and optimization algorithms. He is serving as an Editor for the IET Wireless Sensor Systems Journal and PSU - A Review- Journal. He has served on numerous technical program committees of international conferences and has delivered more than 15 keynote talks on cyber-security.

Read more on Zubair's profile

Research interests

Cyber security

Artificial Intelligence

Combinatorial Optimisation

IoT/Smart Cities

Knowledge areas

Cyber-security

Artificial Intelligence

Combinatorial Optimisation

Smart Cities and IoT

Professional activities

Editor, Wireless Sensor Systems Journal, IET

Editor, PSU-A Review Journal, Emerald Publishing House

Member, IEEE

Member, ACS

Certified Information Systems Security Professional (CISSP)

Media appearances

Channel 9, Identity theft, Perth, 2018

ABC 24, Driverless vehicles and the moral machine, Melbourne, 2018

SBS WorldNews, Driverless vehicles, 2018

The West Australian, Cyber-security talent shortage, 2017

Awards

IEEE Best Student Award, King Fahd University of Petroleum and Minerals, 2002

School of Information Technology Industry Engagement Award, Deakin University, 2019

Publications

Filter by

2020

Averaged dependence estimators for DoS attack detection in IoT networks

Zubair Baig, Surasak Sanguanpong, Syed Firdous, Van Vo, Tri Nguyen, Chakchai So-In

(2020), Vol. 102, pp. 198-209, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Harnessing artificial intelligence capabilities to improve cybersecurity

Sherali Zeadally, Erwin Adi, Zubair Baig, Imran Khan

(2020), Vol. 8, pp. 23817-23837, IEEE Access, Piscatway, N.J., C1

journal

Machine Learning and Data Analytics for the IoT

Erwin Adi, Adnan Anwar, Zubair Baig, Sherali Zeadally

(2020), pp. 1-29, Neural Computing and Applications, Berlin, Germany, C1

journal
2019

Forensic analysis of a crash-damaged Cheerson CX-20 auto pathfinder drone

Ian McAteer, Peter Hannay, Muhammad Malik, Z Baig

(2019), Vol. 13, pp. 5-22, Journal of digital forensics, security and law, Maidens, VA, C1

journal

Bio-inspired cyber-security for the smart grid

Naeem Syed, Ahmed Ibrahim, Z Baig, Craig Valli

(2019), pp. 373-392, Nature-inspired cyber security and resiliency: fundamentals, techniques and applications, Stevenage, Eng., B1

chapter

Information security

Z Baig, Sherali Zeadally, Andrew Woodward

(2019), pp. 13-36, Authentication technologies for cloud technology, IoT, and Big Data, Hong Kong, China, B1

chapter

Cyber-security risk assessment framework for critical infrastructures

Zubair Baig, Sherali Zeadally

(2019), Vol. 25, pp. 121-129, Intelligent automation and soft computing, Albuquerque, N.M., C1

journal

Healthcare data breaches: implications for digital forensic readiness

Maxim Chernyshev, Sherali Zeadally, Zubair Baig

(2019), Vol. 43, pp. 1-12, Journal of medical systems, New York, N.Y., C1-1

journal

Physical layer security for the smart grid: vulnerabilities, threats and countermeasures

Shama Islam, Zubair Baig, Sherali Zeadally

(2019), Vol. 15, pp. 6522-6530, IEEE transactions on industrial informatics, Piscataway, N.J., C1

journal

SeArch: a collaborative and intelligent NIDS architecture for SDN-based cloud IoT networks

Tri Nguyen, Trung Phan, Binh Nguyen, Chakchai So-In, Zubair Baig, Surasak Sanguanpong

(2019), Vol. 7, pp. 107678-107694, IEEE access, Piscataway, N.J., C1

journal

25 years of bluetooth technology

Sherali Zeadally, Farhan Siddiqui, Zubair Baig

(2019), Vol. 11, pp. 1-24, Future internet, Basel, Switzerland, C1

journal

On secure wireless sensor networks with cooperative energy harvesting relaying

Anh-Nhat Nguyen, Van Vo, Chakchai So-In, Dac-Binh Ha, Surasak Sanguanpong, Zubair Baig

(2019), IEEE access, Piscataway, N.J., C1

journal

Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics

Sherali Zeadally, Farhan Siddiqui, Zubair Baig, Ahmed Ibrahim

(2019), pp. 1-17, PSU research review, Bingley, Eng., C1

journal

Digital forensics for drone data - Intelligent clustering using self organising maps

S Mekala, Z Baig

(2019), Vol. 1113, pp. 172-189, Future Network Systems and Security. FNSS 2019, Melbourne, Australia, E1

conference

Deep learning-based intrusion detection for IoT networks

Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, Antonio Robles-Kelly

(2019), pp. 256-265, PRDC 2019 : Proceedings of the 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing, Kyoto, Japan, E1

conference
2018

Ransomware behavioural analysis on windows platforms

Nikolai Hampton, Zubair Baig, Sherali Zeadally

(2018), Vol. 40, pp. 44-51, Journal of information security and applications, Amsterdam, The Netherlands, C1-1

journal

Performance analysis of DF/AF cooperative MISO wireless sensor networks with NOMA and SWIPT over Nakagami-m fading

Duc-Dung Tran, Dac-Binh Ha, Van Vo, Chakchai So-In, Hung Tran, Tri Nguyen, Zubair Baig, Surasak Sanguanpong

(2018), Vol. 6, pp. 56142-56161, IEEE access, Piscataway, N.J., C1-1

journal

Internet of things forensics: the need, process models, and open issues

Maxim Chernyshev, Sherali Zeadally, Zubair Baig, Andrew Woodward

(2018), Vol. 20, pp. 40-49, IT professional, Piscataway, N.J., C1-1

journal

Preparing for secure wireless medical environment in 2050: a vision

Muhammad Malik, Ian McAteer, Peter Hannay, Zubair Baig

(2018), Vol. 6, pp. 25666-25674, IEEE access, Piscataway, N.J., C1-1

journal

Internet of Things (IoT): Research, Simulators, and Testbeds

Maxim Chernyshev, Zubair Baig, Oladayo Bello, Sherali Zeadally

(2018), Vol. 5, pp. 1637-1647, IEEE INTERNET OF THINGS JOURNAL, C1-1

journal

A Novel Approach for Face Recognition Using Fused GMDH-Based Networks

El-Sayed El-Alfy, Zubair Baig, Radwan Abdel-Aal

(2018), Vol. 15, pp. 369-377, International Arab Journal of Information Technology, Jordan, C1-1

journal

Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy

Nhan Van, Gia Tri, Chakchai So-In, Zubair Baig, Surasak Sanguanpong

(2018), Vol. 6, pp. 23406-23419, IEEE Access, Piscataway, N.J., C1-1

journal
2017

Future challenges for smart cities: cyber-security and digital forensics

Z Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, M Johnstone, P Kerai, A Ibrahim, K Sansurooah, N Syed, M Peacock

(2017), Vol. 22, pp. 3-13, Digital investigation, Amsterdam, The Netherlands, C1-1

journal

Mobile Forensics: Advances, Challenges, and Research Opportunities

Maxim Chernyshev, Sherali Zeadally, Zubair Baig, Andrew Woodward

(2017), Vol. 15, pp. 42-51, IEEE SECURITY & PRIVACY, C1-1

journal

Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services

Erwin Adi, Zubair Baig, Philip Hingston

(2017), Vol. 91, pp. 1-13, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, C1-1

journal

Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol

Syed Firdous, Zubair Baig, Craig Valli, Ahmed Ibrahim

(2017), pp. 748-755, EEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, U.K., E1-1

conference
2016

Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks

Z Baig, S Sait, F Binbeshr

(2016), Vol. 97, pp. 31-47, Computer networks, Amsterdam, The Netherlands, C1-1

journal

Controlled Android Application Execution for the IoT Infrastructure

Michael Johnstone, Zubair Baig, Peter Hannay, Clinton Carpene, Malik Feroze

(2016), Vol. 169, pp. 16-26, Internet of Things. IoT Infrastructures. IoT360 2015, Rome, Italy, E1-1

conference

Security Attacks and Solutions in Electronic Health (E-health) Systems

Sherali Zeadally, Jesus Isaac, Zubair Baig

(2016), Vol. 40, JOURNAL OF MEDICAL SYSTEMS, C1-1

journal

Timestamp Analysis for Quality Validation of Network Forensic Data

Nikolai Hampton, Zubair Baig

(2016), Vol. 9955, pp. 235-248, Network and System Security. NSS 2016, Taipei, Taiwan, E1-1

conference

An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud

Saeed Alsowail, Mohammed Sqalli, Marwan Abu-Amara, Zubair Baig, Khaled Salah

(2016), Vol. 41, pp. 5037-5047, ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, C1-1

journal

Distributed Hierarchical Pattern-Matching for Network Intrusion Detection

Zubair Baig, Khaled Salah

(2016), Vol. 17, pp. 167-178, JOURNAL OF INTERNET TECHNOLOGY, C1-1

journal

Distributed denial-of-service attacks against HTTP/2 services

Erwin Adi, Zubair Baig, Philip Hingston, Chiou-Peng Lam

(2016), Vol. 19, pp. 79-86, CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, C1-1

journal
2014

A Novel Mobility-Aware Data Transfer Service (MADTS) Based on DDS Standards

Basem Al-Madani, Ayaz Khan, Zubair Baig

(2014), Vol. 39, pp. 2843-2856, ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, C1-1

journal
2013

Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks Against Cloud Infrastructures

Zubair Baig, Farid Binbeshr

(2013), pp. 346-353, International Conference on Cloud Computing and Big Data (CLOUDCOM-ASIA), Fuzhou, China, E1-1

conference

Hybrid Intelligent Model for Software Maintenance Prediction

Abdulrahman Baqais, Mohammad Alshayeb, Zubair Baig

(2013), World Congress on Engineering (WCE 2013), London, U.K., E1-1

conference

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure using Self-Organizing Maps

Zubair Baig, Saif Ahmad, Sadiq Sait

(2013), pp. 1594-1599, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, E1-1

conference

GMDH-based networks for intelligent intrusion detection

Zubair Baig, Sadiq Sait, AbdulRahman Shaheen

(2013), Vol. 26, pp. 1731-1740, ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, C1-1

journal

SIP VoIP Deployment over Hospitality Networks

Khaled Salah, Jamil Hamodi, Zubair Baig, Fahd Al-Haidari

(2013), Vol. 14, pp. 31-44, JOURNAL OF INTERNET TECHNOLOGY, C1-1

journal
undefined

Security Analytics for the Internet of Everything

Abu Barkat Ullah, Al-Sakib Pathan

(), B1

chapter

Funded Projects at Deakin

Other Public Sector Funding

Zero Trust Architectures for Australia's Critical Infrastructure Security.

Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Arash Shaghaghi

  • 2020: $60,741

Supervisions

No completed student supervisions to report