Biography
ZUBAIR BAIG is currently an Associate Professor, Cyber Security, with the School of Information Technology, Deakin University, Geelong, VIC, Australia. He also serves as the Head of Research Translation, Strategic Centre for Cybersecurity Resilience and Trust (CREST). Baig also directs the post graduate course suite in cyber security.
He has authored/coauthored over 125 journal and conference papers and book chapters. His research interests are in the areas of cyber-security, the IoT, machine learning, digital forensics, and optimization algorithms. He is serving as an Editor for the IET Wireless Sensor Systems Journal and PSU - A Review- Journal. He has served on numerous technical program committees of international conferences and has delivered more than 20 keynote talks on cyber-security.
Read more on Zubair's profileCareer highlights
Standford University's Top 2% Scientists in the World, 2022
AISA Cyber Security Researcher of the Year Nominee, 2022
Research interests
Cyber security for integrated platforms
Risk management
Optimizaiton algorithms and adoption for cyber security vs. performance
Engineering applied cyber security architectures
Complex system vulnerability analysis
Knowledge areas
Cyber-security for IT/OT integrated platforms, space systems and cloud-edge modules
Tradeoff analysis of cyber security solutions
Risk management for enterprises
Machine Learning with applications to cyber security
Security architectures
Digital forensics
Professional activities
Certified Information Systems Security Professional (CISSP)
Editor, Wireless Sensor Systems Journal, IET
Editor, PSU-A Review Journal, Emerald Publishing House
Senior Member, IEEE
Member, ACS
Member, ACM
Media appearances
Cyber awareness in the world of vulnerable apps, the Herald Sun, 2022
Channel 9, Identity theft, Perth, 2018
ABC 24, Driverless vehicles and the moral machine, Melbourne, 2018
SBS WorldNews, Driverless vehicles, 2018
The West Australian, Cyber-security talent shortage, 2017
Research groups
Head of Cyber Security Research Translation, Centre for Cyber Secutity Resilience and Trust (CREST), Deakin University
Awards
Deakin School of IT Excellence in Research Leadership Award - 2021
Deakin School of IT Excellence in Teaching and Curriculum Development Award - 2021
Deakin School of IT Excellence in Research Award - 2020
Deakin School of IT Excellence in External Engagement Award - 2019
IEEE Best Student Award, King Fahd University of Petroleum and Minerals, 2002
Projects
Authentication of Remote Critical Infrastructure Assets in IT/OT Integrated Platforms, Collaborators: TCS, CyberCRC
Security and Strategy for Critical Infrastructures, Collaborators: Deloitte
Ambient Signal Analysis for Multi-Factor Human Authentication in Smart Premises, Collaborators: UNSW, TCS, CyberCRC
Publications
Naeem Syed, Mengmeng Ge, Zubair Baig
(2023), Vol. 225, pp. 1-14, Computer Networks, Amsterdam, The Netherlands, C1
Privacy for IoT: Informed consent management in Smart Buildings
C Pathmabandu, J Grundy, M Chhetri, Z Baig
(2023), Vol. 145, pp. 367-383, Future Generation Computer Systems, Amsterdam, The Netherlands, C1
Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions
S Mekala, Z Baig, A Anwar, S Zeadally
(2023), Vol. 208, pp. 294-320, Computer Communications, C1
Drone Forensics and Machine Learning: Sustaining the Investigation Process
Z Baig, M Khan, N Mohammad, G Brahim
(2022), Vol. 14, pp. 1-17, Sustainability, Basel, Switzerland, C1
Zero Trust Architecture (ZTA): A Comprehensive Survey
N Syed, S Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
(2022), Vol. 10, pp. 57143-57179, IEEE Access, Piscataway, N.J., C1
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
Z Baig, N Syed, N Mohammad
(2022), Vol. 14, pp. 1-19, Future Internet, Basel, Switzerland, C1
Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis
N Syed, M Khan, N Mohammad, G Brahim, Z Baig
(2022), ISDFS 2022 : International Symposium on Digital Forensics and Security 2022, Istanbul, Turkey, E1
A Decentralised Blockchain-Based Secure Authentication Scheme for IoT Devices
E Haqani, Z Baig, F Jiang
(2022), Vol. 436, pp. 123-144, Lecture Notes in Networks and Systems, E1
Industrial Internet of Things (IIoT): Testbed and Datasets for CyberSecurity and Digital Forensics
S Mekala, Z Baig, A Anwar
(2022), 2022 International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2022, E1
Securing contemporary eHealth architectures: Techniques and methods
N Syed, Z Baig, A Anwar
(2021), pp. 207-234, Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, London, Eng., B1
Towards a deep learning-driven intrusion detection approach for Internet of Things
M Ge, N Syed, X Fu, Z Baig, A Robles-Kelly
(2021), Vol. 186, Computer Networks, C1
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
(2021), Vol. 108, Computers and Security, C1
A novel multi-stage distributed authentication scheme for smart meter communication
M Hegde, A Anwar, K Kotegar, Z Baig, R Doss
(2021), Vol. 7, pp. 1-36, PeerJ Computer Science, United States, C1
Maxim Chernyshev, Zubair Baig, Sherali Zeadally
(2021), Vol. 54, pp. 47-57, Computer, Piscataway, N.J., C1
ICME: An informed consent management engine for conformance in smart building environments
C Pathmabandu, J Grundy, M Chhetri, Z Baig
(2021), pp. 1545-1549, ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, Greece, E1
A Youssef, M Abdelrazek, C Karmakar, Z Baig
(2021), Vol. 13041, pp. 340-352, NSS 2021 : Proceedings of the 15th Network and System Security International Conference, Tianjin, China, E1
Cyber security for Network of Things (NoTs) in military systems: challenges and countermeasures
Muhammad Malik, Ian McAteer, Peter Hannay, Ahmed Ibrahim, Zubair Baig, Guanglou Zheng
(2020), pp. 231-247, Security analytics for the internet of everything, Boca Raton, Fla., B1
Averaged dependence estimators for DoS attack detection in IoT networks
Z Baig, S Sanguanpong, S Firdous, V Vo, T Nguyen, C So-In
(2020), Vol. 102, pp. 198-209, Future Generation Computer Systems, C1
Sherali Zeadally, Farhan Siddiqui, Zubair Baig, Ahmed Ibrahim
(2020), Vol. 4, pp. 93-109, PSU research review, Bingley, Eng., C1
Harnessing artificial intelligence capabilities to improve cybersecurity
S Zeadally, E Adi, Z Baig, I Khan
(2020), Vol. 8, pp. 23817-23837, IEEE Access, C1
Machine learning and data analytics for the IoT
E Adi, A Anwar, Z Baig, S Zeadally
(2020), Vol. 32, pp. 16205-16233, Neural Computing and Applications, C1
Denial of service attack detection through machine learning for the IoT
Naeem Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli
(2020), Vol. 4, pp. 482-503, Journal of information and telecommunication, Abingdon, Eng., C1
Digital Forensics for Drones: A Study of Tools and Techniques
S Viswanathan, Z Baig
(2020), Vol. 1338, pp. 29-41, ATIS 2020 : Proceedings of the 11th International Conference on Applications and Techniques in Information Security, Brisbane, Queensland, E1
Towards a lightweight continuous authentication protocol for device-to-device communication
S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
(2020), pp. 1119-1126, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, E1
An informed consent model for managing the privacy paradox in smart buildings
Chehara Pathmabandu, John Grundy, Mohan Chhetri, Zubair Baig
(2020), pp. 19-26, ASEW2020 : Proceedings of IEEE/ACM's 35th International Conference on Automated Software Engineering Workshops, Online, E1
Bio-inspired cyber-security for the smart grid
Naeem Syed, Ahmed Ibrahim, Z Baig, Craig Valli
(2019), pp. 373-392, Nature-inspired cyber security and resiliency: fundamentals, techniques and applications, Stevenage, Eng., B1
Z Baig, Sherali Zeadally, Andrew Woodward
(2019), pp. 13-36, Authentication technologies for cloud technology, IoT, and Big Data, Hong Kong, China, B1
Cyber-security risk assessment framework for critical infrastructures
Z Baig, S Zeadally
(2019), Vol. 25, pp. 121-130, Intelligent Automation and Soft Computing, C1
Healthcare Data Breaches: Implications for Digital Forensic Readiness
M Chernyshev, S Zeadally, Z Baig
(2019), Vol. 43, Journal of Medical Systems, United States, C1-1
Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
S Islam, Z Baig, S Zeadally
(2019), Vol. 15, pp. 6522-6530, IEEE Transactions on Industrial Informatics, C1
SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks
T Nguyen, T Phan, B Nguyen, C So-In, Z Baig, S Sanguanpong
(2019), Vol. 7, pp. 107678-107694, IEEE Access, C1
25 years of bluetooth technology
S Zeadally, F Siddiqui, Z Baig
(2019), Vol. 11, Future Internet, C1
On secure wireless sensor networks with cooperative energy harvesting relaying
A Nguyen, V Nhan Vo, C So-In, D Ha, S Sanguanpong, Z Baig
(2019), Vol. 7, pp. 139212-139225, IEEE Access, C1
Digital forensics for drone data - intelligent clustering using self organising maps
S Mekala, Zubair Baig
(2019), Vol. 1113, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Vic., E1
Deep learning-based intrusion detection for IoT networks
Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, Antonio Robles-Kelly
(2019), pp. 256-265, PRDC 2019 : Proceedings of the 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing, Kyoto, Japan, E1
Ransomware behavioural analysis on windows platforms
Nikolai Hampton, Zubair Baig, Sherali Zeadally
(2018), Vol. 40, pp. 44-51, Journal of information security and applications, Amsterdam, The Netherlands, C1-1
FORENSIC ANALYSIS OF A CRASH-DAMAGED CHEERSON CX-20 AUTO PATHFINDER DRONE
Ian McAteer, Peter Hannay, Muhammad Malik, Zubair Baig
(2018), Vol. 13, pp. 5-21, JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, C1
D Tran, D Ha, V Vo, C So-In, H Tran, T Nguyen, Z Baig, S Sanguanpong
(2018), Vol. 6, pp. 56142-56161, IEEE Access, C1-1
Internet of things forensics: the need, process models, and open issues
Maxim Chernyshev, Sherali Zeadally, Zubair Baig, Andrew Woodward
(2018), Vol. 20, pp. 40-49, IT professional, Piscataway, N.J., C1-1
Preparing for secure wireless medical environment in 2050: a vision
Muhammad Malik, Ian McAteer, Peter Hannay, Zubair Baig
(2018), Vol. 6, pp. 25666-25674, IEEE access, Piscataway, N.J., C1-1
Internet of things (IoT): Research, simulators, and testbeds
M Chernyshev, Z Baig, O Bello, S Zeadally
(2018), Vol. 5, pp. 1637-1647, IEEE Internet of Things Journal, C1-1
A Novel Approach for Face Recognition Using Fused GMDH-Based Networks
El-Sayed El-Alfy, Zubair Baig, Radwan Abdel-Aal
(2018), Vol. 15, pp. 369-377, International Arab Journal of Information Technology, Jordan, C1-1
Nhan Van, Gia Tri, Chakchai So-In, Zubair Baig, Surasak Sanguanpong
(2018), Vol. 6, pp. 23406-23419, IEEE Access, Piscataway, N.J., C1-1
Future challenges for smart cities: cyber-security and digital forensics
Z Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, M Johnstone, P Kerai, A Ibrahim, K Sansurooah, N Syed, M Peacock
(2017), Vol. 22, pp. 3-13, Digital investigation, Amsterdam, The Netherlands, C1-1
Mobile Forensics: Advances, Challenges, and Research Opportunities
Maxim Chernyshev, Sherali Zeadally, Zubair Baig, Andrew Woodward
(2017), Vol. 15, pp. 42-51, IEEE Security & Privacy, Piscataway, N.J., C1-1
Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services
Erwin Adi, Zubair Baig, Philip Hingston
(2017), Vol. 91, pp. 1-13, Journal of network and computer applications, Amsterdam, The Netherlands, C1-1
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol
Syed Firdous, Zubair Baig, Craig Valli, Ahmed Ibrahim
(2017), pp. 748-755, Internet of Things-Green Computing-Cyber, Physical and Social Computing-SmartData 2017 : proceedings : 2017 Institute of Electrical and Electronics Engineers International Conference on Internet of Things, Institute of Electrical and Electronics Engineers Green Computing and Communications, Institute of Electrical and Electronics Engineers Cyber, Physical and Social Computing, Institute of Electrical and Electronics Engineers Smart Data : 21-23 June 2017, Exeter, United Kingdom, Exeter, England, E1-1
Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things
I McAteer, M Malik, Z Baig, P Hannay
(2017), pp. 70-80, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1
Analysis of attempted intrusions: intelligence gathered from SSH honeypots
P Rabadia, C Valli, A Ibrahim, Z Baig
(2017), pp. 26-35, ADF 2017 : Proceedings of the 15th Australian Digital Forensics Conference, Perth, W.A., E1-1
Intelligent feature selection for detecting HTTP/2 denial of service attacks
E Adi, Z Baig
(2017), pp. 57-63, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1
S Wakeling, P Hannay, Z Baig
(2017), pp. 97-107, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1
Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks
Z Baig, S Sait, F Binbeshr
(2016), Vol. 97, pp. 31-47, Computer networks, Amsterdam, The Netherlands, C1-1
Security Attacks and Solutions in Electronic Health (E-health) Systems
S Zeadally, J Isaac, Z Baig
(2016), Vol. 40, Journal of Medical Systems, United States, C1-1
An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud
Saeed Alsowail, Mohammed Sqalli, Marwan Abu-Amara, Zubair Baig, Khaled Salah
(2016), Vol. 41, pp. 5037-5047, Arabian journal for science and engineering, Berlin, Germany, C1-1
Distributed Hierarchical Pattern-Matching for Network Intrusion Detection
Zubair Baig, Khaled Salah
(2016), Vol. 17, pp. 167-178, Journal of internet technology, Taiwan, C1-1
Distributed denial-of-service attacks against HTTP/2 services
E Adi, Z Baig, P Hingston, C Lam
(2016), Vol. 19, pp. 79-86, Cluster Computing, C1-1
Controlled Android Application Execution for the IoT Infrastructure
Michael Johnstone, Zubair Baig, Peter Hannay, Clinton Carpene, Malik Feroze
(2016), pp. 16-26, IoT360 2015 : Proceedings of the 2nd International Internet of Things Summit, Rome, Italy, E1-1
Timestamp Analysis for Quality Validation of Network Forensic Data
Nikolai Hampton, Zubair Baig
(2016), pp. 235-248, NSS 2016 : Proceedings of the International Conference on Network and System Security, Taipei, Taiwan, E1-1
Detection of compromised smart meters in the Advanced Metering Infrastructure
Z Baig, A Al Amoudy, K Salah
(2015), pp. 1-6, GCCCE 2015 : 2015 IEEE 8th GCC Conference and Exhibition, Muscat, Oman, E1-1
Low-rate denial-of-service attacks against HTTP/2 services
E Adi, Z Baig, C Lam, P Hingston
(2015), pp. 1-5, ICITCS 2015 : Proceedings of the 2015 5th International Conference on IT Convergence and Security, Kuala Lumpur, Malaysia, E1-1
Ransomware: Emergence of the cyber-extortion menace
N Hampton, Z Baig
(2015), pp. 47-56, AISM 2015 : Proceedings of the 13th Australian Information Security Management Conference, Perth, W.A., E1-1
A novel mobility-aware data transfer service (MADTS) based on DDS Standards
Basem Al-Madani, Ayaz Khan, Zubair Baig
(2014), Vol. 39, pp. 2843-2856, Arabian journal for science and engineering, Heidelberg, Germany, C1-1
Real-time QoS-aware video streaming: a comparative and experimental study
B Al-Madani, A Al-Roubaiey, Z Baig
(2014), Vol. 2014, pp. 1-11, Advances in multimedia, New York, N.Y., C1-1
Securing the internet of things infrastructure - standards and techniques
Z Baig
(2014), pp. 75-81, AISM 2014 : Proceedings of 12th Australian Information Security Management Conference, Perth, W.A., E1-1
GMDH-based networks for intelligent intrusion detection
Zubair Baig, Sadiq Sait, AbdulRahman Shaheen
(2013), Vol. 26, pp. 1731-1740, Engineering applications of artificial intelligence, Amsterdam, The Netherlands, C1-1
SIP VoIP deployment over hospitality networks
Khaled Salah, Jamil Hamodi, Zubair Baig, Fahd Al-Haidari
(2013), Vol. 14, pp. 31-44, Journal of internet technology, Yilan City, Taiwan, C1-1
An analysis of smart grid attacks and countermeasures
Z Baig, A Amoudi
(2013), Vol. 8, pp. 473-479, Journal of communications, Oulu, Finland, C1-1
Zubair Baig, Farid Binbeshr
(2013), pp. 346-353, CLOUDCOM-ASIA 2013 : International Conference on Cloud Computing and Big Data : CLOUDCOM-ASIA 2013 : proceedings : 16-18 December 2013, Fuzhou, Fujian, China, Fuzhou, China, E1-1
Hybrid Intelligent Model for Software Maintenance Prediction
Abdulrahman Baqais, Mohammad Alshayeb, Zubair Baig
(2013), WCE 2013 : Proceedings of the 2013 World Congress on Engineering, London, England, E1-1
Zubair Baig, Saif Ahmad, Sadiq Sait
(2013), pp. 1594-1599, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1-1
Multi-agent systems for protecting critical infrastructures: A survey
Z Baig
(2012), Vol. 35, pp. 1151-1161, Journal of Network and Computer Applications, C1-1
Video-on-Demand (VoD) deployment over hospitality networks
K Salah, J Hamodi, Z Baig, F Al-Haidari
(2012), Vol. 22, pp. 65-80, International Journal of Network Management, C1-1
Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching
Z Baig
(2012), Vol. 7, pp. 83-94, International Journal of Security and Networks, C1-1
Device implant attack detection for the Smart Grid Infrastructure
Z Baig, S Ahmad
(2012), pp. 1062-1067, Proceedings - 2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012, Seoul, SOUTH KOREA, E1-1
Abductive neural network modeling for hand recognition using geometric features
E El-Alfy, R Abdel-Aal, Z Baig
(2012), Vol. 7666 LNCS, pp. 593-602, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Doha, QATAR, E1-1
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
Z Baig
(2011), Vol. 34, pp. 468-484, Computer Communications, C1
Z Baig, S Adeniye
(2011), pp. 171-176, ICON 2011 - 17th IEEE International Conference on Networks, Singapore, SINGAPORE, E1-1
An entropy and volume-based approach for identifying malicious activities in honeynet traffic
M Sqalli, S Firdous, Z Baig, F Azzedin
(2011), pp. 23-30, Proceedings - 2011 International Conference on Cyberworlds, Cyberworlds 2011, Banff, CANADA, E1-1
On the use of pattern matching for rapid anomaly detection in smart grid infrastructures
Z Baig
(2011), pp. 214-219, 2011 IEEE International Conference on Smart Grid Communications, SmartGridComm 2011, Brussels, Belgium, E1-1
A selective parameter-based evolutionary technique for network intrusion detection
Z Baig, S Khan, S Ahmed, M Sqalli
(2011), pp. 65-71, International Conference on Intelligent Systems Design and Applications, ISDA, E1-1
DDoS Attack Modeling and Detection in Wireless Sensor Networks
Z Baig, A Khan
(2010), pp. 595-626, Mobile Intelligence, B1-1
Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks
Z Baig, K Salah
(2010), Vol. 4, pp. 333-343, IET Information Security, C1
Discovering last-matching rules in popular open-source and commercial firewalls
K Salah, K Sattar, Z Baig, M Sqalli, P Calyam
(2010), Vol. 5, pp. 23-31, International Journal of Internet Protocol Technology, C1-1
Z Baig, S Khan
(2010), pp. 185-189, 2nd International Conference on Future Networks, ICFN 2010, Sanya, PEOPLES R CHINA, E1-1
S Khan, Z Baig
(2010), 2010 IEEE World Congress on Computational Intelligence, WCCI 2010, Barcelona, Spain, E1-1
Resiliency of open-source firewalls against remote discovery of last-matching rules
K Salah, K Sattar, Z Baig, M Sqalli, P Calyam
(2009), pp. 186-192, SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks, E1-1
Z Baig, A Khan
(2008), Vol. 7 LNEE, pp. 277-296, Lecture Notes in Electrical Engineering, E1-1
A simulated evolution-Tabu search hybrid metaheuristic for routing in computer networks
S Khan, Z Baig
(2007), pp. 3818-3823, 2007 IEEE Congress on Evolutionary Computation, CEC 2007, Singapore, SINGAPORE, E1-1
Z Baig, M Baqer, A Khan
(2006), Vol. 3, pp. 1050-1054, Proceedings - International Conference on Pattern Recognition, Hong Kong, PEOPLES R CHINA, E1-1
Z Baig
(2005), pp. 260-266, Proceedings of The 2005 International Conference on Security and Management, SAM'05, Las Vegas, NV, E1-1
M Baqer, A Khan, Z Baig
(2005), Vol. 3823 LNCS, pp. 208-217, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Nagasaki, JAPAN, E1-1
Funded Projects at Deakin
Other Public Sector Funding
Zero Trust Architectures for Australia's Critical Infrastructure Security.
Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Arash Shaghaghi
DSTO Grant - Research - Defence Science & Technology Organisation
- 2020: $60,741
Industry and Other Funding
Development of Cyber Security Guidelines for Critical Infrastructures.
Dr Zubair Baig, Mr Damien Manuel, Prof Robin Ram Mohan Doss
Deloitte Risk Advisory Pty Ltd
- 2021: $14,945
SummerTech
Dr Zubair Baig, Dr Muna Al-Hawawreh, Dr Jesse Laeuchli, Dr Naeem Syed, Dr Anh Dinh
Victorian Chamber of Commerce and Industry
- 2023: $66,000
Other Funding Sources
Lightweight Continuous Authentication for Cloud Edge Integrated Platforms
Dr Zubair Baig, Dr Lei Pan, Prof Robin Ram Mohan Doss
CYBER SECURITY RESEARCH CENTRE
- 2023: $45,000
- 2022: $49,536
- 2021: $15,000
A Decentralised Blockchain-based Secure Authentication Scheme for IoT.
Dr Zubair Baig, Dr Frank Jiang
Cyber Security Research Centre Limited
- 2021: $10,700
Cryptographic authentication for IoT - Cloud integrated platforms.
Dr Zubair Baig, Dr Rolando Trujillo Rasua
Cyber Security Research Centre Limited
- 2021: $10,700
Secure and Authenticated Access to Remote Assets Within Critical Infrastructure.
Dr Zubair Baig, Dr Lei Pan, Dr Keshav Sood, Prof Robin Ram Mohan Doss
Cyber Security Research Centre Limited
- 2023: $135,000
- 2022: $111,458
Robust Authentication using Ambient Intelligence in Smart Environments (RAAISE).
Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Frank Jiang
Cyber Security Research Centre Limited
- 2023: $259,606
- 2022: $159,674
Next Generation Authentication Technologies.
Prof Robin Ram Mohan Doss, Dr Lei Pan, Dr Zubair Baig
Cyber Security Research Centre Limited
- 2023: $262,500
- 2022: $216,724
Socrates: Software Security with a focus on critical technologies.
Dr Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, Dr Lennon Chang, A/Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang
Cyber Security Research Centre Limited
- 2023: $90,732
Supervisions
No completed student supervisions to report