Discovering last-matching rules in popular open-source and commercial firewalls

K. Salah , K. Sattar , Z.A. Baig , M.H. Sqalli
International Journal of Internet Protocol Technology 5 ( 1) 23 -31

2
2010
Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks

Z.A. Baig , K. Salah
Iet Information Security 4 ( 4) 333 -343

16
2010
A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks

Z.A. Baig , M. Baqer , A.I. Khan
international conference on pattern recognition 3 1050 -1054

21
2006
Preventing service flooding on internet DNS servers thru an application-level mechanism: a performance analysis

Zubair Ahmed Baig
International Conference on Security and Management, 2005 260 -268

2005
On Secure Wireless Sensor Networks With Cooperative Energy Harvesting Relaying

Anh-Nhat Nguyen , Van Nhan Vo , Chakchai So-In , Dac-Binh Ha
IEEE Access 7 139212 -139225

3
2019
Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps

Zubair Ahmed Baig , Saif Ahmad , Sadiq Mohammed Sait
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 1594 -1599

5
2013
Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami- $m$ Fading

Duc-Dung Tran , Dac-Binh Ha , Van Nhan Vo , Chakchai So-In
IEEE Access 6 56142 -56161

15
2018
Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy

Van Nhan Vo , Tri Gia Nguyen , Chakchai So-In , Zubair Ahmed Baig
IEEE Access 6 23406 -23419

30
2018
Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks

Zubair Ahmed Baig , Salman Ahmad Khan
international conference on future networks 185 -189

13
2010
SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks

Tri Gia Nguyen , Trung V. Phan , Binh T. Nguyen , Chakchai So-In
IEEE Access 7 107678 -107694

87
2019
Detecting intrusive activity in the smart grid communications infrastructure using self-organizing maps

Zubair Ahmed Baig , Saif Ahmad , Sadiq Mohammed Sait
Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on Trust 1594 -1599

7
2013
Device implant attack detection for the Smart Grid Infrastructure

Z. A. Baig , S. Ahmad
international conference on computing and convergence technology

1
2012
Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks

M. Baqer , A. I. Khan , Z. A. Baig
Embedded and Ubiquitous Computing – EUC 2005 Workshops 208 -217

23
2005
Securing the Internet of Things Infrastructure - Standards and Techniques

Zubair A Baig
australian information security management conference 75 -81

2
2014