Profile image of Zubair Baig

Dr Zubair Baig

STAFF PROFILE

Position

Associate Professor, Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Qualifications

Doctor of Philosophy, Monash University, 2008
Master of Science, University of Maryland, 2003
Bachelor of Science, King Fahd Uni of Pet. and Min., 2002

Contact

zubair.baig@deakin.edu.au
+61 3 522 73525

Biography

ZUBAIR BAIG is currently an Associate Professor, Cyber Security, with the School of Information Technology, Deakin University, Geelong, VIC, Australia. He also serves as the Head of Research Translation, Strategic Centre for Cybersecurity Resilience and Trust (CREST). Baig also directs the post graduate course suite in cyber security. 

He has authored/coauthored over 125 journal and conference papers and book chapters. His research interests are in the areas of cyber-security, the IoT, machine learning, digital forensics, and optimization algorithms. He is serving as an Editor for the IET Wireless Sensor Systems Journal and PSU - A Review- Journal. He has served on numerous technical program committees of international conferences and has delivered more than 20 keynote talks on cyber-security.

Read more on Zubair's profile

Career highlights

Standford University's Top 2% Scientists in the World, 2022

AISA Cyber Security Researcher of the Year Nominee, 2022

Research interests

Cyber security for integrated platforms

Risk management

Optimizaiton algorithms and adoption for cyber security vs. performance

Engineering applied cyber security architectures

Complex system vulnerability analysis

Knowledge areas

Cyber-security for IT/OT integrated platforms, space systems and cloud-edge modules

Tradeoff analysis of cyber security solutions

Risk management for enterprises

Machine Learning with applications to cyber security

Security architectures

Digital forensics 

Professional activities

Certified Information Systems Security Professional (CISSP)

Editor, Wireless Sensor Systems Journal, IET

Editor, PSU-A Review Journal, Emerald Publishing House

Senior Member, IEEE

Member, ACS

Member, ACM 

Media appearances

Cyber awareness in the world of vulnerable apps, the Herald Sun, 2022

Channel 9, Identity theft, Perth, 2018

ABC 24, Driverless vehicles and the moral machine, Melbourne, 2018

SBS WorldNews, Driverless vehicles, 2018

The West Australian, Cyber-security talent shortage, 2017

Research groups

Head of Cyber Security Research Translation, Centre for Cyber Secutity Resilience and Trust (CREST), Deakin University

Awards

Deakin School of IT Excellence in Research Leadership Award - 2021

Deakin School of IT Excellence in Teaching and Curriculum Development Award - 2021

Deakin School of IT Excellence in Research Award - 2020

Deakin School of IT Excellence in External Engagement Award - 2019

IEEE Best Student Award, King Fahd University of Petroleum and Minerals, 2002

Projects

Authentication of Remote Critical Infrastructure Assets in IT/OT Integrated Platforms, Collaborators: TCS, CyberCRC

Security and Strategy for Critical Infrastructures, Collaborators: Deloitte

Ambient Signal Analysis for Multi-Factor Human Authentication in Smart Premises, Collaborators: UNSW, TCS, CyberCRC

Publications

Filter by

2023

Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks

Naeem Syed, Mengmeng Ge, Zubair Baig

(2023), Vol. 225, pp. 1-14, Computer Networks, Amsterdam, The Netherlands, C1

journal article

Privacy for IoT: Informed consent management in Smart Buildings

C Pathmabandu, J Grundy, M Chhetri, Z Baig

(2023), Vol. 145, pp. 367-383, Future Generation Computer Systems, Amsterdam, The Netherlands, C1

journal article

Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions

S Mekala, Z Baig, A Anwar, S Zeadally

(2023), Vol. 208, pp. 294-320, Computer Communications, C1

journal article

Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors

Zubair Baig, Sri Mekala, Sherali Zeadally

(2023), Vol. 25, pp. 37-44, IT Professional, Piscataway, NJ., C1

journal article

DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm

S Mekala, Z Baig, A Anwar, N Syed

(2023), pp. 32-39, Proceedings - 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops, ASEW 2023, LUXEMBOURG, Echternach, E1

conference
2022

Drone Forensics and Machine Learning: Sustaining the Investigation Process

Z Baig, M Khan, N Mohammad, G Brahim

(2022), Vol. 14, pp. 1-17, Sustainability, Basel, Switzerland, C1

journal article

Zero Trust Architecture (ZTA): A Comprehensive Survey

N Syed, S Shah, A Shaghaghi, A Anwar, Z Baig, R Doss

(2022), Vol. 10, pp. 57143-57179, IEEE Access, Piscataway, N.J., C1

journal article

Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning

Z Baig, N Syed, N Mohammad

(2022), Vol. 14, pp. 1-19, Future Internet, Basel, Switzerland, C1

journal article

Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis

N Syed, M Khan, N Mohammad, G Brahim, Z Baig

(2022), ISDFS 2022 : International Symposium on Digital Forensics and Security 2022, Istanbul, Turkey, E1

conference

A Decentralised Blockchain-Based Secure Authentication Scheme for IoT Devices

E Haqani, Z Baig, F Jiang

(2022), Vol. 436, pp. 123-144, Lecture Notes in Networks and Systems, E1

conference

Industrial Internet of Things (IIoT): Testbed and Datasets for CyberSecurity and Digital Forensics

S Mekala, Z Baig, A Anwar

(2022), 2022 International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2022, E1

conference
2021

Securing contemporary eHealth architectures: Techniques and methods

N Syed, Z Baig, A Anwar

(2021), pp. 207-234, Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, London, Eng., B1

book chapter

Towards a deep learning-driven intrusion detection approach for Internet of Things

M Ge, N Syed, X Fu, Z Baig, A Robles-Kelly

(2021), Vol. 186, Computer Networks, C1

journal article

LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)

S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss

(2021), Vol. 108, Computers and Security, C1

journal article

A novel multi-stage distributed authentication scheme for smart meter communication

M Hegde, A Anwar, K Kotegar, Z Baig, R Doss

(2021), Vol. 7, pp. 1-36, PeerJ Computer Science, United States, C1

journal article

Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface

Maxim Chernyshev, Zubair Baig, Sherali Zeadally

(2021), Vol. 54, pp. 47-57, Computer, Piscataway, N.J., C1

journal article

ICME: An informed consent management engine for conformance in smart building environments

C Pathmabandu, J Grundy, M Chhetri, Z Baig

(2021), pp. 1545-1549, ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, Greece, E1

conference

Tracing Software Exploitation

A Youssef, M Abdelrazek, C Karmakar, Z Baig

(2021), Vol. 13041, pp. 340-352, NSS 2021 : Proceedings of the 15th Network and System Security International Conference, Tianjin, China, E1

conference
2020

Cyber security for Network of Things (NoTs) in military systems: challenges and countermeasures

Muhammad Malik, Ian McAteer, Peter Hannay, Ahmed Ibrahim, Zubair Baig, Guanglou Zheng

(2020), pp. 231-247, Security analytics for the internet of everything, Boca Raton, Fla., B1

book chapter

Averaged dependence estimators for DoS attack detection in IoT networks

Z Baig, S Sanguanpong, S Firdous, V Vo, T Nguyen, C So-In

(2020), Vol. 102, pp. 198-209, Future Generation Computer Systems, C1

journal article

Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics

Sherali Zeadally, Farhan Siddiqui, Zubair Baig, Ahmed Ibrahim

(2020), Vol. 4, pp. 93-109, PSU research review, Bingley, Eng., C1

journal article

Harnessing artificial intelligence capabilities to improve cybersecurity

S Zeadally, E Adi, Z Baig, I Khan

(2020), Vol. 8, pp. 23817-23837, IEEE Access, C1

journal article

Machine learning and data analytics for the IoT

E Adi, A Anwar, Z Baig, S Zeadally

(2020), Vol. 32, pp. 16205-16233, Neural Computing and Applications, C1

journal article

Denial of service attack detection through machine learning for the IoT

Naeem Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli

(2020), Vol. 4, pp. 482-503, Journal of information and telecommunication, Abingdon, Eng., C1

journal article

Digital Forensics for Drones: A Study of Tools and Techniques

S Viswanathan, Z Baig

(2020), Vol. 1338, pp. 29-41, ATIS 2020 : Proceedings of the 11th International Conference on Applications and Techniques in Information Security, Brisbane, Queensland, E1

conference

Towards a lightweight continuous authentication protocol for device-to-device communication

S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss

(2020), pp. 1119-1126, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, E1

conference

An informed consent model for managing the privacy paradox in smart buildings

Chehara Pathmabandu, John Grundy, Mohan Chhetri, Zubair Baig

(2020), pp. 19-26, ASEW2020 : Proceedings of IEEE/ACM's 35th International Conference on Automated Software Engineering Workshops, Online, E1

conference
2019

Bio-inspired cyber-security for the smart grid

Naeem Syed, Ahmed Ibrahim, Z Baig, Craig Valli

(2019), pp. 373-392, Nature-inspired cyber security and resiliency: fundamentals, techniques and applications, Stevenage, Eng., B1

book chapter

Information security

Z Baig, Sherali Zeadally, Andrew Woodward

(2019), pp. 13-36, Authentication technologies for cloud technology, IoT, and Big Data, Hong Kong, China, B1

book chapter

Cyber-security risk assessment framework for critical infrastructures

Z Baig, S Zeadally

(2019), Vol. 25, pp. 121-130, Intelligent Automation and Soft Computing, C1

journal article

Healthcare Data Breaches: Implications for Digital Forensic Readiness

M Chernyshev, S Zeadally, Z Baig

(2019), Vol. 43, Journal of Medical Systems, United States, C1-1

journal article

Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures

S Islam, Z Baig, S Zeadally

(2019), Vol. 15, pp. 6522-6530, IEEE Transactions on Industrial Informatics, C1

journal article

SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks

T Nguyen, T Phan, B Nguyen, C So-In, Z Baig, S Sanguanpong

(2019), Vol. 7, pp. 107678-107694, IEEE Access, C1

journal article

25 years of bluetooth technology

S Zeadally, F Siddiqui, Z Baig

(2019), Vol. 11, Future Internet, C1

journal article

On secure wireless sensor networks with cooperative energy harvesting relaying

A Nguyen, V Nhan Vo, C So-In, D Ha, S Sanguanpong, Z Baig

(2019), Vol. 7, pp. 139212-139225, IEEE Access, C1

journal article

Digital forensics for drone data - intelligent clustering using self organising maps

S Mekala, Zubair Baig

(2019), Vol. 1113, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Vic., E1

conference

Deep learning-based intrusion detection for IoT networks

Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, Antonio Robles-Kelly

(2019), pp. 256-265, PRDC 2019 : Proceedings of the 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing, Kyoto, Japan, E1

conference
2018

Ransomware behavioural analysis on windows platforms

Nikolai Hampton, Zubair Baig, Sherali Zeadally

(2018), Vol. 40, pp. 44-51, Journal of information security and applications, Amsterdam, The Netherlands, C1-1

journal article

FORENSIC ANALYSIS OF A CRASH-DAMAGED CHEERSON CX-20 AUTO PATHFINDER DRONE

Ian McAteer, Peter Hannay, Muhammad Malik, Zubair Baig

(2018), Vol. 13, pp. 5-21, JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, C1

journal article

Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks with NOMA and SWIPT over Nakagami-m Fading

D Tran, D Ha, V Vo, C So-In, H Tran, T Nguyen, Z Baig, S Sanguanpong

(2018), Vol. 6, pp. 56142-56161, IEEE Access, C1-1

journal article

Internet of things forensics: the need, process models, and open issues

Maxim Chernyshev, Sherali Zeadally, Zubair Baig, Andrew Woodward

(2018), Vol. 20, pp. 40-49, IT professional, Piscataway, N.J., C1-1

journal article

Preparing for secure wireless medical environment in 2050: a vision

Muhammad Malik, Ian McAteer, Peter Hannay, Zubair Baig

(2018), Vol. 6, pp. 25666-25674, IEEE access, Piscataway, N.J., C1-1

journal article

Internet of things (IoT): Research, simulators, and testbeds

M Chernyshev, Z Baig, O Bello, S Zeadally

(2018), Vol. 5, pp. 1637-1647, IEEE Internet of Things Journal, C1-1

journal article

A Novel Approach for Face Recognition Using Fused GMDH-Based Networks

El-Sayed El-Alfy, Zubair Baig, Radwan Abdel-Aal

(2018), Vol. 15, pp. 369-377, International Arab Journal of Information Technology, Jordan, C1-1

journal article

Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy

Nhan Van, Gia Tri, Chakchai So-In, Zubair Baig, Surasak Sanguanpong

(2018), Vol. 6, pp. 23406-23419, IEEE Access, Piscataway, N.J., C1-1

journal article
2017

Future challenges for smart cities: cyber-security and digital forensics

Z Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, M Johnstone, P Kerai, A Ibrahim, K Sansurooah, N Syed, M Peacock

(2017), Vol. 22, pp. 3-13, Digital investigation, Amsterdam, The Netherlands, C1-1

journal article

Mobile Forensics: Advances, Challenges, and Research Opportunities

Maxim Chernyshev, Sherali Zeadally, Zubair Baig, Andrew Woodward

(2017), Vol. 15, pp. 42-51, IEEE Security & Privacy, Piscataway, N.J., C1-1

journal article

Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services

Erwin Adi, Zubair Baig, Philip Hingston

(2017), Vol. 91, pp. 1-13, Journal of network and computer applications, Amsterdam, The Netherlands, C1-1

journal article

Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol

Syed Firdous, Zubair Baig, Craig Valli, Ahmed Ibrahim

(2017), pp. 748-755, Internet of Things-Green Computing-Cyber, Physical and Social Computing-SmartData 2017 : proceedings : 2017 Institute of Electrical and Electronics Engineers International Conference on Internet of Things, Institute of Electrical and Electronics Engineers Green Computing and Communications, Institute of Electrical and Electronics Engineers Cyber, Physical and Social Computing, Institute of Electrical and Electronics Engineers Smart Data : 21-23 June 2017, Exeter, United Kingdom, Exeter, England, E1-1

conference

Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things

I McAteer, M Malik, Z Baig, P Hannay

(2017), pp. 70-80, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1

conference

Analysis of attempted intrusions: intelligence gathered from SSH honeypots

P Rabadia, C Valli, A Ibrahim, Z Baig

(2017), pp. 26-35, ADF 2017 : Proceedings of the 15th Australian Digital Forensics Conference, Perth, W.A., E1-1

conference

Intelligent feature selection for detecting HTTP/2 denial of service attacks

E Adi, Z Baig

(2017), pp. 57-63, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1

conference

A review of data breaches and losses that occurred from laptops that were stolen or otherwise misplaced in 2015 and 2016

S Wakeling, P Hannay, Z Baig

(2017), pp. 97-107, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1

conference
2016

Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks

Z Baig, S Sait, F Binbeshr

(2016), Vol. 97, pp. 31-47, Computer networks, Amsterdam, The Netherlands, C1-1

journal article

Security Attacks and Solutions in Electronic Health (E-health) Systems

S Zeadally, J Isaac, Z Baig

(2016), Vol. 40, Journal of Medical Systems, United States, C1-1

journal article

An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud

Saeed Alsowail, Mohammed Sqalli, Marwan Abu-Amara, Zubair Baig, Khaled Salah

(2016), Vol. 41, pp. 5037-5047, Arabian journal for science and engineering, Berlin, Germany, C1-1

journal article

Distributed Hierarchical Pattern-Matching for Network Intrusion Detection

Zubair Baig, Khaled Salah

(2016), Vol. 17, pp. 167-178, Journal of internet technology, Taiwan, C1-1

journal article

Distributed denial-of-service attacks against HTTP/2 services

E Adi, Z Baig, P Hingston, C Lam

(2016), Vol. 19, pp. 79-86, Cluster Computing, C1-1

journal article

Controlled Android Application Execution for the IoT Infrastructure

Michael Johnstone, Zubair Baig, Peter Hannay, Clinton Carpene, Malik Feroze

(2016), pp. 16-26, IoT360 2015 : Proceedings of the 2nd International Internet of Things Summit, Rome, Italy, E1-1

conference

Timestamp Analysis for Quality Validation of Network Forensic Data

Nikolai Hampton, Zubair Baig

(2016), pp. 235-248, NSS 2016 : Proceedings of the International Conference on Network and System Security, Taipei, Taiwan, E1-1

conference
2015

Detection of compromised smart meters in the Advanced Metering Infrastructure

Z Baig, A Al Amoudy, K Salah

(2015), pp. 1-6, GCCCE 2015 : 2015 IEEE 8th GCC Conference and Exhibition, Muscat, Oman, E1-1

conference

Low-rate denial-of-service attacks against HTTP/2 services

E Adi, Z Baig, C Lam, P Hingston

(2015), pp. 1-5, ICITCS 2015 : Proceedings of the 2015 5th International Conference on IT Convergence and Security, Kuala Lumpur, Malaysia, E1-1

conference

Ransomware: Emergence of the cyber-extortion menace

N Hampton, Z Baig

(2015), pp. 47-56, AISM 2015 : Proceedings of the 13th Australian Information Security Management Conference, Perth, W.A., E1-1

conference
2014

A novel mobility-aware data transfer service (MADTS) based on DDS Standards

Basem Al-Madani, Ayaz Khan, Zubair Baig

(2014), Vol. 39, pp. 2843-2856, Arabian journal for science and engineering, Heidelberg, Germany, C1-1

journal article

Real-time QoS-aware video streaming: a comparative and experimental study

B Al-Madani, A Al-Roubaiey, Z Baig

(2014), Vol. 2014, pp. 1-11, Advances in multimedia, New York, N.Y., C1-1

journal article

Securing the internet of things infrastructure - standards and techniques

Z Baig

(2014), pp. 75-81, AISM 2014 : Proceedings of 12th Australian Information Security Management Conference, Perth, W.A., E1-1

conference
2013

GMDH-based networks for intelligent intrusion detection

Zubair Baig, Sadiq Sait, AbdulRahman Shaheen

(2013), Vol. 26, pp. 1731-1740, Engineering applications of artificial intelligence, Amsterdam, The Netherlands, C1-1

journal article

SIP VoIP deployment over hospitality networks

Khaled Salah, Jamil Hamodi, Zubair Baig, Fahd Al-Haidari

(2013), Vol. 14, pp. 31-44, Journal of internet technology, Yilan City, Taiwan, C1-1

journal article

An analysis of smart grid attacks and countermeasures

Z Baig, A Amoudi

(2013), Vol. 8, pp. 473-479, Journal of communications, Oulu, Finland, C1-1

journal article

Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks Against Cloud Infrastructures

Zubair Baig, Farid Binbeshr

(2013), pp. 346-353, CLOUDCOM-ASIA 2013 : International Conference on Cloud Computing and Big Data : CLOUDCOM-ASIA 2013 : proceedings : 16-18 December 2013, Fuzhou, Fujian, China, Fuzhou, China, E1-1

conference

Hybrid Intelligent Model for Software Maintenance Prediction

Abdulrahman Baqais, Mohammad Alshayeb, Zubair Baig

(2013), WCE 2013 : Proceedings of the 2013 World Congress on Engineering, London, England, E1-1

conference

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure using Self-Organizing Maps

Zubair Baig, Saif Ahmad, Sadiq Sait

(2013), pp. 1594-1599, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1-1

conference
2012

Multi-agent systems for protecting critical infrastructures: A survey

Z Baig

(2012), Vol. 35, pp. 1151-1161, Journal of Network and Computer Applications, C1-1

journal article

Video-on-Demand (VoD) deployment over hospitality networks

K Salah, J Hamodi, Z Baig, F Al-Haidari

(2012), Vol. 22, pp. 65-80, International Journal of Network Management, C1-1

journal article

Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching

Z Baig

(2012), Vol. 7, pp. 83-94, International Journal of Security and Networks, C1-1

journal article

Device implant attack detection for the Smart Grid Infrastructure

Z Baig, S Ahmad

(2012), pp. 1062-1067, Proceedings - 2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012, Seoul, SOUTH KOREA, E1-1

conference

Abductive neural network modeling for hand recognition using geometric features

E El-Alfy, R Abdel-Aal, Z Baig

(2012), Vol. 7666 LNCS, pp. 593-602, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Doha, QATAR, E1-1

conference
2011

Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks

Z Baig

(2011), Vol. 34, pp. 468-484, Computer Communications, C1

journal article

A trust-based mechanism for protecting IPv6 networks against stateless address auto-configuration attacks

Z Baig, S Adeniye

(2011), pp. 171-176, ICON 2011 - 17th IEEE International Conference on Networks, Singapore, SINGAPORE, E1-1

conference

An entropy and volume-based approach for identifying malicious activities in honeynet traffic

M Sqalli, S Firdous, Z Baig, F Azzedin

(2011), pp. 23-30, Proceedings - 2011 International Conference on Cyberworlds, Cyberworlds 2011, Banff, CANADA, E1-1

conference

On the use of pattern matching for rapid anomaly detection in smart grid infrastructures

Z Baig

(2011), pp. 214-219, 2011 IEEE International Conference on Smart Grid Communications, SmartGridComm 2011, Brussels, Belgium, E1-1

conference

A selective parameter-based evolutionary technique for network intrusion detection

Z Baig, S Khan, S Ahmed, M Sqalli

(2011), pp. 65-71, International Conference on Intelligent Systems Design and Applications, ISDA, E1-1

conference
2010

DDoS Attack Modeling and Detection in Wireless Sensor Networks

Z Baig, A Khan

(2010), pp. 595-626, Mobile Intelligence, B1-1

book chapter

Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks

Z Baig, K Salah

(2010), Vol. 4, pp. 333-343, IET Information Security, C1

journal article

Discovering last-matching rules in popular open-source and commercial firewalls

K Salah, K Sattar, Z Baig, M Sqalli, P Calyam

(2010), Vol. 5, pp. 23-31, International Journal of Internet Protocol Technology, C1-1

journal article

Fuzzy logic-based decision making for detecting distributed node-exhaustion attacks in wireless sensor networks

Z Baig, S Khan

(2010), pp. 185-189, 2nd International Conference on Future Networks, ICFN 2010, Sanya, PEOPLES R CHINA, E1-1

conference

On the use of Unified And-Or fuzzy operator for distributed node exhaustion attack decision-making in wireless sensor networks

S Khan, Z Baig

(2010), 2010 IEEE World Congress on Computational Intelligence, WCCI 2010, Barcelona, Spain, E1-1

conference
2009

Resiliency of open-source firewalls against remote discovery of last-matching rules

K Salah, K Sattar, Z Baig, M Sqalli, P Calyam

(2009), pp. 186-192, SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks, E1-1

conference
2008

A fault-tolerant scheme for detection of DDoS attack patterns in cluster-based wireless sensor networks

Z Baig, A Khan

(2008), Vol. 7 LNEE, pp. 277-296, Lecture Notes in Electrical Engineering, E1-1

conference
2007

A simulated evolution-Tabu search hybrid metaheuristic for routing in computer networks

S Khan, Z Baig

(2007), pp. 3818-3823, 2007 IEEE Congress on Evolutionary Computation, CEC 2007, Singapore, SINGAPORE, E1-1

conference
2006

A pattern recognition scheme for Distributed Denial of Service (DDoS) attacks in wireless sensor networks

Z Baig, M Baqer, A Khan

(2006), Vol. 3, pp. 1050-1054, Proceedings - International Conference on Pattern Recognition, Hong Kong, PEOPLES R CHINA, E1-1

conference
2005

Preventing service flooding on Internet DNS servers thru an application-level mechanism: A performance analysis

Z Baig

(2005), pp. 260-266, Proceedings of The 2005 International Conference on Security and Management, SAM'05, Las Vegas, NV, E1-1

conference

Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks

M Baqer, A Khan, Z Baig

(2005), Vol. 3823 LNCS, pp. 208-217, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Nagasaki, JAPAN, E1-1

conference

Funded Projects at Deakin

Other Public Sector Funding

Zero Trust Architectures for Australia's Critical Infrastructure Security.

Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Arash Shaghaghi

DSTO Grant - Research - Defence Science & Technology Organisation

  • 2020: $60,741

Industry and Other Funding

Development of Cyber Security Guidelines for Critical Infrastructures.

Dr Zubair Baig, Mr Damien Manuel, Prof Robin Ram Mohan Doss

Deloitte Risk Advisory Pty Ltd

  • 2021: $14,945

SummerTech

Dr Zubair Baig, Dr Muna Al-Hawawreh, Dr Jesse Laeuchli, Dr Naeem Syed, Dr Anh Dinh

Victorian Chamber of Commerce and Industry

  • 2023: $66,000

Other Funding Sources

Lightweight Continuous Authentication for Cloud Edge Integrated Platforms

Dr Zubair Baig, A/Prof Lei Pan, Prof Robin Ram Mohan Doss

CYBER SECURITY RESEARCH CENTRE

  • 2024: $15,000
  • 2023: $60,000
  • 2022: $49,536
  • 2021: $15,000

A Decentralised Blockchain-based Secure Authentication Scheme for IoT.

Dr Zubair Baig, Dr Frank Jiang

Cyber Security Research Centre Limited

  • 2021: $10,700

Cryptographic authentication for IoT - Cloud integrated platforms.

Dr Zubair Baig, Dr Rolando Trujillo Rasua

Cyber Security Research Centre Limited

  • 2021: $10,700

Secure and Authenticated Access to Remote Assets Within Critical Infrastructure.

Dr Zubair Baig, A/Prof Lei Pan, Dr Keshav Sood, Prof Robin Ram Mohan Doss

Cyber Security Research Centre Limited

  • 2023: $165,000
  • 2022: $111,458

Robust Authentication using Ambient Intelligence in Smart Environments (RAAISE).

Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Frank Jiang

Cyber Security Research Centre Limited

  • 2023: $259,606
  • 2022: $159,674

Next Generation Authentication Technologies.

Prof Robin Ram Mohan Doss, A/Prof Lei Pan, Dr Zubair Baig

Cyber Security Research Centre Limited

  • 2024: $87,500
  • 2023: $306,250
  • 2022: $216,724

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $30,244
  • 2023: $120,976

Supervisions

No completed student supervisions to report