2. Intelligent Data Communication Technologies and Internet of Things J Hemanth, X Fernando, P Lafata, Z Baig International Conference on Intelligent Data Communication Technologies and …, 2018 | 2 | 2018 |
231 Cyber Security for Network of Things (NoTs) in Military Systems: Challenges and Countermeasures MI Malik, IN McAteer, P Hannay, A Ibrahim, Z Baig, G Zheng Security Analytics for the Internet of Everything, 231-249, 0 | | |
25 years of bluetooth technology S Zeadally, F Siddiqui, Z Baig Future Internet 11 (9), 194, 2019 | 70 | 2019 |
A decentralised blockchain-based secure authentication scheme for IoT devices EA Haqani, Z Baig, F Jiang Inventive Systems and Control: Proceedings of ICISC 2022, 123-144, 2022 | 4 | 2022 |
A fault-tolerant scheme for detection of ddos attack patterns in cluster-based wireless sensor networks ZA Baig, AI Khan Sensor and Ad Hoc Networks: Theoretical and Algorithmic Aspects, 277-296, 2008 | 7 | 2008 |
A novel approach for face recognition using fused GMDH-based networks. ESM El-Alfy, ZA Baig, RE Abdel-Aal Int. Arab J. Inf. Technol. 15 (3), 369-377, 2018 | 5 | 2018 |
A novel mobility-aware data transfer service (MADTS) based on DDS standards B Al-Madani, AH Khan, ZA Baig Arabian Journal for Science and Engineering 39, 2843-2856, 2014 | 1 | 2014 |
A novel multi-stage distributed authentication scheme for smart meter communication M Hegde, A Anwar, K Kotegar, Z Baig, R Doss PeerJ Computer Science 7, e643, 2021 | 2 | 2021 |
A pattern recognition scheme for distributed denial of service (ddos) attacks in wireless sensor networks ZA Baig, M Baqer, AI Khan 18th International Conference on Pattern Recognition (ICPR'06) 3, 1050-1054, 2006 | 35 | 2006 |
A review of data breaches and losses that occurred from laptops that were stolen or otherwise misplaced in 2015 and 2016 SG Wakeling, P Hannay, Z Baig | 1 | 2017 |
A selective parameter-based evolutionary technique for network intrusion detection ZA Baig, S Khan, S Ahmed, MH Sqalli 2011 11th International Conference on Intelligent Systems Design and …, 2011 | 2 | 2011 |
A Simulated Evolution-Tabu search hybrid metaheuristic for routing in computer networks SA Khan, ZA Baig 2007 IEEE Congress on Evolutionary Computation, 3818-3823, 2007 | 5 | 2007 |
A trust-based mechanism for protecting IPv6 networks against stateless address auto-configuration attacks ZA Baig, SC Adeniye 2011 17th IEEE International Conference on Networks, 171-176, 2011 | 14 | 2011 |
A two-tiered user feedback-based approach for spam detection MA Feroze, ZA Baig, MN Johnstone ICSNC, 12-17, 2015 | 3 | 2015 |
Abductive neural network modeling for hand recognition using geometric features ESM El-Alfy, RE Abdel-Aal, ZA Baig Neural Information Processing: 19th International Conference, ICONIP 2012 …, 2012 | 6 | 2012 |
Ahmed, Sanam 124 Aleti, Aldeida 105 Aloísio, João 151 Arachchilage, Nalin Asanka Gamagedara 7 Z Baig, MO Beg, BM Bhatti, FA Bhuiyan, TF Bissyandé, S Chen, ... | | |
An analysis of smart grid attacks and countermeasures. ZA Baig, AR Amoudi J. Commun. 8 (8), 473-479, 2013 | 92 | 2013 |
An AODE-based intrusion detection system for computer networks ZA Baig, AS Shaheen, R AbdelAal 2011 World Congress on Internet Security (WorldCIS-2011), 28-35, 2011 | 11 | 2011 |
An entropy and volume-based approach for identifying malicious activities in honeynet traffic MH Sqalli, SN Firdous, Z Baig, F Azzedin 2011 International Conference on Cyberworlds, 23-30, 2011 | 10 | 2011 |
An experimental evaluation of the EDoS-shield mitigation technique for securing the cloud S Alsowail, MH Sqalli, M Abu-Amara, Z Baig, K Salah Arabian Journal for Science and Engineering 41, 5037-5047, 2016 | 16 | 2016 |