Dr Zubair Baig

STAFF PROFILE

Position

Senior Lecturer, Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Qualifications

Doctor of Philosophy, Monash University, 2008
Master of Science, University of Maryland, 2003
Bachelor of Science, King Fahd Uni of Pet. and Min., 2002

Contact

zubair.baig@deakin.edu.au
+61 3 522 73525

Biography

ZUBAIR BAIG is currently a Senior Lecturer in Cyber Security with the School of Information Technology, Deakin University, Geelong, VIC, Australia. He is also the Co-Director of the Security and Privacy in IoT (SPYRiT) Research Lab and Division Lead, IoT, Critical Infrastructure and CPS Security, Centre for Cyber Security Research and Innovation (CSRI).

He has authored/coauthored over 85 journal and conference papers and book chapters. His research interests are in the areas of cyber-security, the IoT, artificial intelligence, and optimization algorithms. He is serving as an Editor for the IET Wireless Sensor Systems Journal and PSU - A Review- Journal. He has served on numerous technical program committees of international conferences and has delivered more than 15 keynote talks on cyber-security.

Read more on Zubair's profile

Research interests

Cyber security

Artificial Intelligence

Combinatorial Optimisation

IoT/Smart Cities

Knowledge areas

Cyber-security

Artificial Intelligence

Combinatorial Optimisation

Smart Cities and IoT

Professional activities

Editor, Wireless Sensor Systems Journal, IET

Editor, PSU-A Review Journal, Emerald Publishing House

Member, IEEE

Member, ACS

Certified Information Systems Security Professional (CISSP)

Media appearances

Channel 9, Identity theft, Perth, 2018

ABC 24, Driverless vehicles and the moral machine, Melbourne, 2018

SBS WorldNews, Driverless vehicles, 2018

The West Australian, Cyber-security talent shortage, 2017

Awards

IEEE Best Student Award, King Fahd University of Petroleum and Minerals, 2002

School of Information Technology Industry Engagement Award, Deakin University, 2019

Publications

Filter by

2020

Averaged dependence estimators for DoS attack detection in IoT networks

Zubair Baig, Surasak Sanguanpong, Syed Firdous, Van Vo, Tri Nguyen, Chakchai So-In

(2020), Vol. 102, pp. 198-209, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Harnessing artificial intelligence capabilities to improve cybersecurity

Sherali Zeadally, Erwin Adi, Zubair Baig, Imran Khan

(2020), Vol. 8, pp. 23817-23837, IEEE Access, Piscatway, N.J., C1

journal article

Machine Learning and Data Analytics for the IoT

Erwin Adi, Adnan Anwar, Zubair Baig, Sherali Zeadally

(2020), pp. 1-29, Neural Computing and Applications, Berlin, Germany, C1

journal article

Denial of service attack detection through machine learning for the IoT

Naeem Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli

(2020), Journal of Information and Telecommunication, Abingdon, Eng., C1

journal article
2019

Bio-inspired cyber-security for the smart grid

Naeem Syed, Ahmed Ibrahim, Z Baig, Craig Valli

(2019), pp. 373-392, Nature-inspired cyber security and resiliency: fundamentals, techniques and applications, Stevenage, Eng., B1

book chapter

Information security

Z Baig, Sherali Zeadally, Andrew Woodward

(2019), pp. 13-36, Authentication technologies for cloud technology, IoT, and Big Data, Hong Kong, China, B1

book chapter

Forensic analysis of a crash-damaged Cheerson CX-20 auto pathfinder drone

Ian McAteer, Peter Hannay, Muhammad Malik, Z Baig

(2019), Vol. 13, pp. 5-22, Journal of digital forensics, security and law, Maidens, VA, C1

journal article

Cyber-security risk assessment framework for critical infrastructures

Zubair Baig, Sherali Zeadally

(2019), Vol. 25, pp. 121-129, Intelligent automation and soft computing, Albuquerque, N.M., C1

journal article

Healthcare data breaches: implications for digital forensic readiness

Maxim Chernyshev, Sherali Zeadally, Zubair Baig

(2019), Vol. 43, pp. 1-12, Journal of medical systems, New York, N.Y., C1-1

journal article

Physical layer security for the smart grid: vulnerabilities, threats and countermeasures

Shama Islam, Zubair Baig, Sherali Zeadally

(2019), Vol. 15, pp. 6522-6530, IEEE transactions on industrial informatics, Piscataway, N.J., C1

journal article

SeArch: a collaborative and intelligent NIDS architecture for SDN-based cloud IoT networks

Tri Nguyen, Trung Phan, Binh Nguyen, Chakchai So-In, Zubair Baig, Surasak Sanguanpong

(2019), Vol. 7, pp. 107678-107694, IEEE access, Piscataway, N.J., C1

journal article

25 years of bluetooth technology

Sherali Zeadally, Farhan Siddiqui, Zubair Baig

(2019), Vol. 11, pp. 1-24, Future internet, Basel, Switzerland, C1

journal article

On secure wireless sensor networks with cooperative energy harvesting relaying

Anh-Nhat Nguyen, Van Vo, Chakchai So-In, Dac-Binh Ha, Surasak Sanguanpong, Zubair Baig

(2019), IEEE access, Piscataway, N.J., C1

journal article

Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics

Sherali Zeadally, Farhan Siddiqui, Zubair Baig, Ahmed Ibrahim

(2019), pp. 1-17, PSU research review, Bingley, Eng., C1

journal article

Digital forensics for drone data - Intelligent clustering using self organising maps

S Mekala, Z Baig

(2019), Vol. 1113, pp. 172-189, Future Network Systems and Security. FNSS 2019, Melbourne, Australia, E1

conference

Deep learning-based intrusion detection for IoT networks

Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, Antonio Robles-Kelly

(2019), pp. 256-265, PRDC 2019 : Proceedings of the 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing, Kyoto, Japan, E1

conference

Digital Forensics for Drone Data - Intelligent Clustering Using Self Organising Maps

Sri Mekala, Zubair Baig

(2019), Vol. 1113, pp. 172-189, Future Network Systems and Security. FNSS 2019, Melbourne, Australia, E1

conference
2018

Ransomware behavioural analysis on windows platforms

Nikolai Hampton, Zubair Baig, Sherali Zeadally

(2018), Vol. 40, pp. 44-51, Journal of information security and applications, Amsterdam, The Netherlands, C1-1

journal article

Performance analysis of DF/AF cooperative MISO wireless sensor networks with NOMA and SWIPT over Nakagami-m fading

Duc-Dung Tran, Dac-Binh Ha, Van Vo, Chakchai So-In, Hung Tran, Tri Nguyen, Zubair Baig, Surasak Sanguanpong

(2018), Vol. 6, pp. 56142-56161, IEEE access, Piscataway, N.J., C1-1

journal article

Internet of things forensics: the need, process models, and open issues

Maxim Chernyshev, Sherali Zeadally, Zubair Baig, Andrew Woodward

(2018), Vol. 20, pp. 40-49, IT professional, Piscataway, N.J., C1-1

journal article

Preparing for secure wireless medical environment in 2050: a vision

Muhammad Malik, Ian McAteer, Peter Hannay, Zubair Baig

(2018), Vol. 6, pp. 25666-25674, IEEE access, Piscataway, N.J., C1-1

journal article

Internet of things (IoT): research, simulators, and testbeds

M Chernyshev, Z Baig, O Bello, S Zeadally

(2018), Vol. 5, pp. 1637-1647, IEEE internet of things journal, Piscataway, N.J., C1-1

journal article

A Novel Approach for Face Recognition Using Fused GMDH-Based Networks

El-Sayed El-Alfy, Zubair Baig, Radwan Abdel-Aal

(2018), Vol. 15, pp. 369-377, International Arab Journal of Information Technology, Jordan, C1-1

journal article

Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy

Nhan Van, Gia Tri, Chakchai So-In, Zubair Baig, Surasak Sanguanpong

(2018), Vol. 6, pp. 23406-23419, IEEE Access, Piscataway, N.J., C1-1

journal article
2017

Future challenges for smart cities: cyber-security and digital forensics

Z Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, M Johnstone, P Kerai, A Ibrahim, K Sansurooah, N Syed, M Peacock

(2017), Vol. 22, pp. 3-13, Digital investigation, Amsterdam, The Netherlands, C1-1

journal article

Mobile Forensics: Advances, Challenges, and Research Opportunities

Maxim Chernyshev, Sherali Zeadally, Zubair Baig, Andrew Woodward

(2017), Vol. 15, pp. 42-51, IEEE Security & Privacy, Piscataway, N.J., C1-1

journal article

Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services

Erwin Adi, Zubair Baig, Philip Hingston

(2017), Vol. 91, pp. 1-13, Journal of network and computer applications, Amsterdam, The Netherlands, C1-1

journal article

Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol

Syed Firdous, Zubair Baig, Craig Valli, Ahmed Ibrahim

(2017), pp. 748-755, Internet of Things-Green Computing-Cyber, Physical and Social Computing-SmartData 2017 : proceedings : 2017 Institute of Electrical and Electronics Engineers International Conference on Internet of Things, Institute of Electrical and Electronics Engineers Green Computing and Communications, Institute of Electrical and Electronics Engineers Cyber, Physical and Social Computing, Institute of Electrical and Electronics Engineers Smart Data : 21-23 June 2017, Exeter, United Kingdom, Exeter, England, E1-1

conference

Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things

I McAteer, M Malik, Z Baig, P Hannay

(2017), pp. 70-80, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1

conference

Analysis of attempted intrusions: intelligence gathered from SSH honeypots

P Rabadia, C Valli, A Ibrahim, Z Baig

(2017), pp. 26-35, ADF 2017 : Proceedings of the 15th Australian Digital Forensics Conference, Perth, W.A., E1-1

conference

Intelligent feature selection for detecting HTTP/2 denial of service attacks

E Adi, Z Baig

(2017), pp. 57-63, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1

conference

A review of data breaches and losses that occurred from laptops that were stolen or otherwise misplaced in 2015 and 2016

S Wakeling, P Hannay, Z Baig

(2017), pp. 97-107, AISM 2017 : Proceedings of the 15th Australian Information Security Management Conference, Perth, W.A., E1-1

conference
2016

Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks

Z Baig, S Sait, F Binbeshr

(2016), Vol. 97, pp. 31-47, Computer networks, Amsterdam, The Netherlands, C1-1

journal article

Security Attacks and Solutions in Electronic Health (E-health) Systems

Sherali Zeadally, Jesus Isaac, Zubair Baig

(2016), Vol. 40, pp. 1-12, Journal of Medical Systems, Berlin, Germany, C1-1

journal article

An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud

Saeed Alsowail, Mohammed Sqalli, Marwan Abu-Amara, Zubair Baig, Khaled Salah

(2016), Vol. 41, pp. 5037-5047, Arabian journal for science and engineering, Berlin, Germany, C1-1

journal article

Distributed Hierarchical Pattern-Matching for Network Intrusion Detection

Zubair Baig, Khaled Salah

(2016), Vol. 17, pp. 167-178, Journal of internet technology, Taiwan, C1-1

journal article

Distributed denial-of-service attacks against HTTP/2 services

Erwin Adi, Zubair Baig, Philip Hingston, Chiou-Peng Lam

(2016), Vol. 19, pp. 79-86, Cluster computing, New York, N.Y., C1-1

journal article

Controlled Android Application Execution for the IoT Infrastructure

Michael Johnstone, Zubair Baig, Peter Hannay, Clinton Carpene, Malik Feroze

(2016), pp. 16-26, IoT360 2015 : Proceedings of the 2nd International Internet of Things Summit, Rome, Italy, E1-1

conference

Timestamp Analysis for Quality Validation of Network Forensic Data

Nikolai Hampton, Zubair Baig

(2016), pp. 235-248, NSS 2016 : Proceedings of the International Conference on Network and System Security, Taipei, Taiwan, E1-1

conference
2015

Detection of compromised smart meters in the Advanced Metering Infrastructure

Z Baig, A Al Amoudy, K Salah

(2015), pp. 1-6, GCCCE 2015 : 2015 IEEE 8th GCC Conference and Exhibition, Muscat, Oman, E1-1

conference

Low-rate denial-of-service attacks against HTTP/2 services

E Adi, Z Baig, C Lam, P Hingston

(2015), pp. 1-5, ICITCS 2015 : Proceedings of the 2015 5th International Conference on IT Convergence and Security, Kuala Lumpur, Malaysia, E1-1

conference
2014

A novel mobility-aware data transfer service (MADTS) based on DDS Standards

Basem Al-Madani, Ayaz Khan, Zubair Baig

(2014), Vol. 39, pp. 2843-2856, Arabian journal for science and engineering, Heidelberg, Germany, C1-1

journal article

Real-time QoS-aware video streaming: a comparative and experimental study

B Al-Madani, A Al-Roubaiey, Z Baig

(2014), Vol. 2014, pp. 1-11, Advances in multimedia, New York, N.Y., C1-1

journal article

Securing the internet of things infrastructure - standards and techniques

Z Baig

(2014), pp. 75-81, AISM 2014 : Proceedings of 12th Australian Information Security Management Conference, Perth, W.A., E1-1

conference
2013

GMDH-based networks for intelligent intrusion detection

Zubair Baig, Sadiq Sait, AbdulRahman Shaheen

(2013), Vol. 26, pp. 1731-1740, Engineering applications of artificial intelligence, Amsterdam, The Netherlands, C1-1

journal article

SIP VoIP deployment over hospitality networks

Khaled Salah, Jamil Hamodi, Zubair Baig, Fahd Al-Haidari

(2013), Vol. 14, pp. 31-44, Journal of internet technology, Yilan City, Taiwan, C1-1

journal article

An analysis of smart grid attacks and countermeasures

Z Baig, A Amoudi

(2013), Vol. 8, pp. 473-479, Journal of communications, Oulu, Finland, C1-1

journal article

Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks Against Cloud Infrastructures

Zubair Baig, Farid Binbeshr

(2013), pp. 346-353, CLOUDCOM-ASIA 2013 : International Conference on Cloud Computing and Big Data : CLOUDCOM-ASIA 2013 : proceedings : 16-18 December 2013, Fuzhou, Fujian, China, Fuzhou, China, E1-1

conference

Hybrid Intelligent Model for Software Maintenance Prediction

Abdulrahman Baqais, Mohammad Alshayeb, Zubair Baig

(2013), WCE 2013 : Proceedings of the 2013 World Congress on Engineering, London, England, E1-1

conference

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure using Self-Organizing Maps

Zubair Baig, Saif Ahmad, Sadiq Sait

(2013), pp. 1594-1599, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1-1

conference
2011

Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks

Z Baig

(2011), Vol. 34, pp. 468-484, Computer Communications, C1

journal article
2010

Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks

Z Baig, K Salah

(2010), Vol. 4, pp. 333-343, IET Information Security, C1

journal article
undefined

Security Analytics for the Internet of Everything

Abu Barkat Ullah, Al-Sakib Pathan

(), B1

book chapter

Funded Projects at Deakin

Other Public Sector Funding

Zero Trust Architectures for Australia's Critical Infrastructure Security.

Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Arash Shaghaghi

  • 2020: $60,741

Supervisions

No completed student supervisions to report