关注
Zubair Baig
Zubair Baig
Associate Professor, Cyber-Security, Deakin University, Melbourne, Australia
在 deakin.edu.au 的电子邮件经过验证
标题
引用次数
年份
2. Intelligent Data Communication Technologies and Internet of Things
J Hemanth, X Fernando, P Lafata, Z Baig
International Conference on Intelligent Data Communication Technologies and …, 2018
22018
231 Cyber Security for Network of Things (NoTs) in Military Systems: Challenges and Countermeasures
MI Malik, IN McAteer, P Hannay, A Ibrahim, Z Baig, G Zheng
Security Analytics for the Internet of Everything, 231-249, 0
25 years of bluetooth technology
S Zeadally, F Siddiqui, Z Baig
Future Internet 11 (9), 194, 2019
702019
A decentralised blockchain-based secure authentication scheme for IoT devices
EA Haqani, Z Baig, F Jiang
Inventive Systems and Control: Proceedings of ICISC 2022, 123-144, 2022
42022
A fault-tolerant scheme for detection of ddos attack patterns in cluster-based wireless sensor networks
ZA Baig, AI Khan
Sensor and Ad Hoc Networks: Theoretical and Algorithmic Aspects, 277-296, 2008
72008
A novel approach for face recognition using fused GMDH-based networks.
ESM El-Alfy, ZA Baig, RE Abdel-Aal
Int. Arab J. Inf. Technol. 15 (3), 369-377, 2018
52018
A novel mobility-aware data transfer service (MADTS) based on DDS standards
B Al-Madani, AH Khan, ZA Baig
Arabian Journal for Science and Engineering 39, 2843-2856, 2014
12014
A novel multi-stage distributed authentication scheme for smart meter communication
M Hegde, A Anwar, K Kotegar, Z Baig, R Doss
PeerJ Computer Science 7, e643, 2021
22021
A pattern recognition scheme for distributed denial of service (ddos) attacks in wireless sensor networks
ZA Baig, M Baqer, AI Khan
18th International Conference on Pattern Recognition (ICPR'06) 3, 1050-1054, 2006
352006
A review of data breaches and losses that occurred from laptops that were stolen or otherwise misplaced in 2015 and 2016
SG Wakeling, P Hannay, Z Baig
12017
A selective parameter-based evolutionary technique for network intrusion detection
ZA Baig, S Khan, S Ahmed, MH Sqalli
2011 11th International Conference on Intelligent Systems Design and …, 2011
22011
A Simulated Evolution-Tabu search hybrid metaheuristic for routing in computer networks
SA Khan, ZA Baig
2007 IEEE Congress on Evolutionary Computation, 3818-3823, 2007
52007
A trust-based mechanism for protecting IPv6 networks against stateless address auto-configuration attacks
ZA Baig, SC Adeniye
2011 17th IEEE International Conference on Networks, 171-176, 2011
142011
A two-tiered user feedback-based approach for spam detection
MA Feroze, ZA Baig, MN Johnstone
ICSNC, 12-17, 2015
32015
Abductive neural network modeling for hand recognition using geometric features
ESM El-Alfy, RE Abdel-Aal, ZA Baig
Neural Information Processing: 19th International Conference, ICONIP 2012 …, 2012
62012
Ahmed, Sanam 124 Aleti, Aldeida 105 Aloísio, João 151 Arachchilage, Nalin Asanka Gamagedara 7
Z Baig, MO Beg, BM Bhatti, FA Bhuiyan, TF Bissyandé, S Chen, ...
An analysis of smart grid attacks and countermeasures.
ZA Baig, AR Amoudi
J. Commun. 8 (8), 473-479, 2013
922013
An AODE-based intrusion detection system for computer networks
ZA Baig, AS Shaheen, R AbdelAal
2011 World Congress on Internet Security (WorldCIS-2011), 28-35, 2011
112011
An entropy and volume-based approach for identifying malicious activities in honeynet traffic
MH Sqalli, SN Firdous, Z Baig, F Azzedin
2011 International Conference on Cyberworlds, 23-30, 2011
102011
An experimental evaluation of the EDoS-shield mitigation technique for securing the cloud
S Alsowail, MH Sqalli, M Abu-Amara, Z Baig, K Salah
Arabian Journal for Science and Engineering 41, 5037-5047, 2016
162016
系统目前无法执行此操作,请稍后再试。
文章 1–20