Future challenges for smart cities: Cyber-security and digital forensics ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ... Digital Investigation 22, 3-13, 2017 | 352 | 2017 |
Deep Learning-based Intrusion Detection for IoT Networks M Ge, X Fu, N Syed, Z Baig, G Teo, A Robles-Kelly. PRDC2019, 2019 | 275 | 2019 |
Zero trust architecture (zta): A comprehensive survey NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss IEEE access 10, 57143-57179, 2022 | 201 | 2022 |
Towards a deep learning-driven intrusion detection approach for Internet of Things M Ge, NF Syed, X Fu, Z Baig, A Robles-Kelly Computer Networks 186, 107784, 2021 | 187 | 2021 |
Denial of service attack detection through machine learning for the IoT NF Syed, Z Baig, A Ibrahim, C Valli Journal of Information and Telecommunication, 2020 | 148 | 2020 |
Averaged dependence estimators for DoS attack detection in IoT networks ZA Baig, S Sanguanpong, SN Firdous, TG Nguyen, C So-In Future Generation Computer Systems 102, 198-209, 2020 | 124 | 2020 |
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol SN Firdous, Z Baig, C Valli, A Ibrahim IEEE International Conference on Internet of Things (iThings) and IEEE Green …, 2017 | 111 | 2017 |
Traceability in supply chains: A Cyber security analysis NF Syed, SW Shah, R Trujillo-Rasua, R Doss Computers & Security 112, 102536, 2022 | 62 | 2022 |
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks NF Syed, M Ge, Z Baig Computer Networks 225, 109662, 2023 | 51 | 2023 |
LCDA: Lightweight continuous device-to-device authentication for a zero trust architecture (ZTA) SW Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss Computers & Security 108, 102351, 2021 | 50 | 2021 |
Securing the smart city airspace: Drone cyber attack detection through machine learning Z Baig, N Syed, N Mohammad Future Internet 14 (7), 205, 2022 | 37 | 2022 |
XMPP architecture and security challenges in an IoT ecosystem MI Malik, IN McAteer, P Hannay, SN Firdous, Z Baig Security Research Institute, Edith Cowan University, 2018 | 16 | 2018 |
Towards a lightweight continuous authentication protocol for device-to-device communication SWA Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss 2020 IEEE 19th international conference on trust, security and privacy in …, 2020 | 12 | 2020 |
An entropy and volume-based approach for identifying malicious activities in honeynet traffic MH Sqalli, SN Firdous, Z Baig, F Azzedin 2011 International Conference on Cyberworlds, 23-30, 2011 | 10 | 2011 |
IoT-MQTT based denial of service attack modelling and detection NF Syed Edith Cowan University, 2020 | 9 | 2020 |
Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning M Mehmood, Z Baig, N Syed 2024 16th International Conference on COMmunication Systems & NETworkS …, 2024 | 4 | 2024 |
Unsupervised machine learning for drone forensics through flight path analysis N Syed, MA Khan, N Mohammad, GB Brahim, Z Baig 2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2022 | 4 | 2022 |
Classifying malicious activities in Honeynets using entropy and volume‐based thresholds MH Sqalli, SN Firdous, K Salah, M Abu‐Amara Security and Communication Networks 6 (5), 567-583, 2013 | 4 | 2013 |
Evaluation and Analysis of a Digital Forensic Readiness Framework for the IIoT SH Mekala, Z Baig, A Anwar, N Syed 2024 12th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2024 | 3 | 2024 |
DoS attacks, human factors, and evidence extraction for the industrial internet of things (IIoT) paradigm SH Mekala, Z Baig, A Anwar, N Syed 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 3 | 2023 |