当前位置: X-MOL首页全球导师 海外导师 › Baig, Zubair

研究领域

Network Attack Modelling and Detection, Machine Learning, Digital Forensics

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Baig, Z., Salah, K., (2016), Distributed hierarchical pattern-matching for network intrusion detection. Journal of Internet Technology, 17(2), 167-178, Hualien, Taiwan, DOI: 10.6138/JIT.2016.17.2.20131021. Baig, Z., Sait, S., Binbeshr, F., (2016), Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Computer Networks, 97(1), 31-47, Amsterdam, Netherlands, DOI: 10.1016/j.comnet.2016.01.002. Al-Madani, B., Khan, Au., Baig, Z., (2014), A Novel Mobility-Aware Data Transfer Service (MADTS) Based on DDS Standards. Arabian Journal for Science and Engineering Section B: Engineering, 39(4), 2843-2856, DOI: 10.1007/s13369-014-0944-7. Salah, K., Hamodi, J., Baig, Z., Al-Haidari, F., (2013), SIP VoIP Deployment over Hospitality Networks. Journal of Internet Technology, 14(1), 31-44, Taiwan, Republic of China, DOI: 10.6138/JIT.2013.14.1.04. Baig, Z., Amoudi, A., (2013), An Analysis of Smart Grid Attacks and Countermeasures. Journal of Communications, 8(8), 473-479, United States, DOI: 10.12720/jcm.8.8.473-479. Baig, Z., Sait, S., Shaheen, A., (2013), GMDH-based Networks for Intelligent Intrusion Detection. Engineering Applications of Artificial Intelligence, 26(7), 1731-1740, United Kingdom, DOI: 10.1016/j.engappai.2013.03.008. Salah, K., Hamodi, J., Baig, Z., Al-Haidari, F., (2012), Video?on?Demand (VoD) deployment over hospitality networks. International Journal of Network Management, 22(1), 65-80, United Kingdom, DOI: 10.1002/nem.787. Baig, Z., (2012), Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching. International Journal of Security and Networks, 7(2), 83-94, DOI: 10.1504/IJSN.2012.050025. Ahmad, S., Baig, Z., (2012), Fuzzy-Based Optimization for Effective Detection of Smart Grid Cyber-Attacks. International Journal of Smart Grid and Clean Energy, 1(1), 15-21, DOI: 10.12720/sgce.1.1.15-21. Baig, Z., (2012), Multi-Agent Systems for Protecting Critical Infrastructures: A Survey. Journal of Network and Computer Applications, 35(3), 1151-1161, United Kingdom, DOI: 10.1016/j.jnca.2012.01.006. Baig, Z., (2011), Pattern Recognition for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks. Computer Communications, 33(3), 468-484, Netherlands, DOI: 10.1016/j.comcom.2010.04.008. Baig, Z., Shaheen, A., Abdelaal, R., (2011), One-Dependence Estimators for Accurate Detection of Anomalous Network Traffic. International Journal for Information Security Research, 1(4), 202-210. Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17. Baig, Z., Al Amoudy, A., Salah, K., (2015), Detection of compromised smart meters in the advanced metering infrastructure. Proceedings of the 8th IEEE GCC Conference and Exhibition, Article number 7060073, DOI: 10.1109/IEEEGCC.2015.7060073. Adi, E., Baig, Z., Lam, P., Hingston, P., (2015), Low-rate denial-of-service attacks against HTTP/2 services. 2015 5th International Conference on IT Convergence and Security (ICITCS): Proceedings, Article num 7292994, DOI: 10.1109/ICITCS.2015.7292994. Baqais, AA., Alshayeb, M., Baig, Z., (2014), Hybrid intelligent model for software maintenance prediction. Lecture Notes in Engineering and Computer Science, 1 LNECS(3-5 July 2013), 358-362, London, U.K.. Baig, Z., (2014), Securing the Internet of Things Infrastructure - Standards and Techniques. The Proceedings of 12th Australian Information Security Management Conference, 75-81, Perth, W.A.. Baig, Z., Binbeshr, F., (2013), Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks Against Cloud Infrastructures. Proceedings 2013 International Conference on Cloud Computing and Big Data CloudCom-Asia 2013, 346-353, Piscataway, NJ, USA. Baig, Z., Ahmad, S., Sait, S., (2013), Detecting intrusive activity in the smart grid communications infrastructure using self-organizing maps. Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 1594-1599, Piscataway, NJ, USA, DOI: 10.1109/TrustCom.2013.196. Baig, Z., (2011), On the Use of Pattern Matching for Rapid Anomaly Detection in Smart Grid Infrastructures. 2011 IEEE International Conference on Smart Grid Communications, SmartGridComm 2011, 214-219, Piscataway, NJ, USA, DOI: 10.1109/SmartGridComm.2011.6102321.

推荐链接
down
wechat
bug