An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud

Saeed Alsowail , Mohammed H. Sqalli , Marwan Abu-Amara , Zubair Baig
Arabian Journal for Science and Engineering 41 ( 12) 5037 -5047

6
2016
Forensic analysis of a crash-damaged Cheerson CX-20 auto pathfinder drone

Ian McAteer , Peter Hannay , Muhammad Malik , Zubair Baig
The Journal of Digital Forensics, Security and Law 13 ( 4) 5 -22

2018
Ransomware behavioural analysis on windows platforms

Nikolai Hampton , Zubair Baig , Sherali Zeadally
workshop on information security applications 40 44 -51

29
2018
Digital Forensics for Drones: A Study of Tools and Techniques

Sowmya Viswanathan , Zubair Baig
information security conference 29 -41

2020
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol

Syed Naeem Firdous , Zubair Baig , Craig Valli , Ahmed Ibrahim
green computing and communications 748 -755

24
2017
Security Attacks and Solutions in Electronic Health (E-health) Systems

Sherali Zeadally , Jesús Téllez Isaac , Zubair Baig
Journal of Medical Systems 40 ( 12) 1 -12

22
2016
SGSIA-in-Network Data Preprocessing for Secure Grid-Sensor Integration

Zubair Baig , Mohamed Baqer , Asad Khan
international conference on e science

4
2006
Low-Rate Denial-of-Service Attacks against HTTP/2 Services

Erwin Adi , Zubair Baig , Chiou Peng Lam , Philip Hingston
2015 5th International Conference on IT Convergence and Security (ICITCS) 1 -5

13
2015
Resiliency of open-source firewalls against remote discovery of last-matching rules

Khaled Salah , Karim Sattar , Zubair Baig , Mohammed Sqalli
Proceedings of the 2nd international conference on Security of information and networks - SIN '09 186 -192

3
2009
Controlled Android Application Execution for the IoT Infrastructure

Michael N. Johnstone , Zubair Baig , Peter Hannay , Clinton Carpene
Internet of Things. IoT Infrastructures 16 -26

1
2016
Cyber security for Network of Things (NoTs) in military systems: challenges and countermeasures

Muhammad Imran Malik , Ian Noel McAteer , Peter Hannay , Ahmed Ibrahim
Security analytics for the internet of everything 231 -247

2020
Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures

Shama Naz Islam , Zubair Baig , Sherali Zeadally
IEEE Transactions on Industrial Informatics 15 ( 12) 6522 -6530

73
2019
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity

Sherali Zeadally , Erwin Adi , Zubair Baig , Imran A. Khan
IEEE Access 8 23817 -23837

100
2020
Bio-inspired cyber-security for the smart grid

Naeem Firdous Syed , Ahmed Ibrahim , Zubair Baig , Craig Valli
Nature-inspired cyber security and resiliency: fundamentals, techniques and applications 373 -392

2019
Securing the smart city airspace: Drone cyber attack detection through machine learning

Zubair Baig , Naeem Syed , Nazeeruddin Mohammad ,
Future Internet 14 ( 7) 205

2
2022
Zero trust architecture (zta): A comprehensive survey

Naeem Firdous Syed , Syed W Shah , Arash Shaghaghi , Adnan Anwar
IEEE Access 10 57143 -57179

11
2022
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks

Naeem Firdous Syed , Mengmeng Ge , Zubair Baig
Computer Networks 225 109662

2023
LCDA: lightweight continuous device-to-device authentication for a zero trust architecture (ZTA)

Syed W Shah , Naeem F Syed , Arash Shaghaghi , Adnan Anwar
Computers \& Security 108 102351

11
2021
Proceedings of International Conference on Sustainable Expert Systems: ICSES 2020

Subarna Shakya , Valentina Emilia Balas , Wang Haoxiang , Zubair Baig
Springer Singapore, Imprint: Springer

1
2021
Proceedings of International Conference on Sustainable Expert Systems

Subarna Shakya , Valentina Emilia Balas , Wang Haoxiang , Zubair Baig