Research Publications

Journal Articles

  1. Zubair A. Baig and Abdul-Raoof Amoudi, An Analysis of Smart Grid Attacks and Countermeasures, Journal of Communications, Volume 8 (8) (2013).

  2. Zubair A. Baig, Sadiq M. Sait, and Abdul-Rahman Shaheen, GMDH-based Networks for Intelligent Intrusion Detection, Elsevier Engineering Applications of Artificial Intelligence, In Press.

  3. Basem Madani, Ayaz Hassan, Zubair A. Baig, MADTS: Mobility-Aware Data Transfer Service based on the DDS Specification, Arabian Journal of Science and Engineering, In Press.
  4. Saif Ahmad and Zubair A. Baig, Fuzzy-based Optimization for Effective Detection of Smart Grid Cyber-Attacks, International Journal of Smart Grid and Clean Energy Technologies Volume 1(1)  (2013).
  5. K. Salah, J. Hamodi, Z. A. Baig, and F. Al-Haidari, SIP VoIP Deployment over Hospitality Networks, Journal of Internet Technology, Volume 14(1): 31-44 (2013).
  6. Zubair A. Baig, Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching, International Journal of Security and Networks, Volume 7 (2): 83-94 (2012)
  7. Zubair A. Baig, Multi-agent systems for protecting critical infrastructures: A survey, Journal of Network and Computer Applications, Volume 35(3): 1151-1161 (2012).
  8. K. Salah, J. Hamodi, Z. A. Baig, F Al-Haidari, Video-on-Demand Deployment over Hospitality Networks, International Journal of Network Management, Volume 22(1): 65-80 (2012)
  9. Zubair A. Baig, Abdulrahman Shaheen, Radwan Abdel-Aal, One-Dependence Estimators for Accurate Detection of Anomalous Network Traffic, International Journal for Information Security Research, Volume 1(4): 202-210 (2011).
  10. Zubair A. Baig and K. Salah, Multiagent Pattern Recognition for Detecting DDoS Attacks, IET Journal of Information Security, Volume 4(4): 333-343 (2010).
  11. Zubair A. Baig, Pattern Recognition for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks, Elsevier Computer Communications, Volume 34 (3): 468-484 (2011).
  12. K. Salah, K. Sattar, Z. A. Baig, M. Sqalli, P. Calyam, Discovering last-matching rules in popular open-source and commercial firewalls, International Journal of Internet Protocol Technology, Volume 5(1/2): 23-31 (2010).

Book Chapters

  1. Zubair A. Baig and Asad I. Khan, DDoS Attack Modeling and Detection in Wireless Sensor Networks, Mobile Intelligence: Mobile Computing and Computational Intelligence, John Wiley and Sons, January, 2010. (Amongst the top books in the PROSE rankings)

  2. Zubair A. Baig and Asad I. Khan, A Fault-Tolerant Scheme for Detecting DDoS Attack Patterns in Cluster-based Wireless Sensor Networks, Sensor and Ad-Hoc Networks: Theoretical and Algorithmic Aspects by S. Makki et. al, Springer, February, 2008

Conference Papers (International Peer-Reviewed)

  1. Zubair A. Baig, Saif Ahmad, and Sadiq M. Sait, Detecting Intrusive Activity in the Smart Grid Communications Infrastructure using Self-Organizing Maps, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, July, 2013.

  2. AbdulRahman Baqais, Mohammed AlShayeb, and Zubair A. Baig, Hybrid Intelligent Model for Software Maintenance Prediction, Accepted for presentation at the World Congress on Engineering, London, The UK, July, 2013.

  3. Saif Ahmad and Zubair A. Baig, Fuzzy-based Optimization for Effective Detection of Smart Grid Cyber-Attacks, Accepted for presentation at the 2nd International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), Hong Kong, October, 2012.

  4. El-Sayed M. El-Alfy, Radwan Abdel-Aal and Zubair A. Baig, Abductive Neural Network Modeling for Hand Recognition Using Geometric Features, Accepted for presentation at the 19th International Conference on Neural Information Processing (ICONIP2012), Doha, Qatar, November, 2012.

  5. Zubair A. Baig and Suli Adeniye, A Trust-Based Mechanism for Protecting IPv6 Networks against Stateless Address Auto-Configuration Attacks, 17th IEEE International Conference on Networks (ICON), Singapore, December, 2011.

  6. Zubair A. Baig, Saad Khan, Saif Ahmed, Mohammed H. Sqalli, A Selective Parameter-based Evolutionary Technique for Network Intrusion Detection, 11th International Conference on Intelligent Systems Design and Applications (ISDA), Cordoba, Spain, November 2011.

  7. Zubair A. Baig, On the Use of Pattern Matching for Rapid Anomaly Detection in Smart Grid Infrastructures. IEEE Smart Grid Communications Conference, Brussels, Belgium, October 2011.

  8. Mohammed H. Sqalli, Syed Naeem Firdous, Zubair A. Baig, Farag Azzedin, An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic. CW2011, Canada, October 2011.

  9. Zubair A. Baig, Abdulrhman Shaheen, Radwan Abdel-Aal, An AODE-based Network Intrusion Detection System, In Proc. of the IEEE World Congress on Information Security, London, The UK, February 2011.

  10. Salman Khan and Zubair A. Baig, On the Use of Unified And-Or Fuzzy Operator for Distributed Node Exhaustion Attack Decision-making in Wireless Sensor Networks, to appear in Proceedings of the World Congress on Computational Intelligence, July, 2010 (Special Session on Fuzzy Logic).

  11. Zubair A. Baig and Salman A. Khan. Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks. In Proc. of the Intl' Conf. on Future Networks, Sanya, China, January, 2010.

  12. K. Salah, K. Sattar, Z. A. Baig, M. Sqalli, P. Calyam, Resiliency of Open-Source Firewalls against Remote Discovery of Last-Matching Rules. In Proc. of the ACM 2nd Intl' Conf. on Security and Networks, Gazimagusa, North Cyprus, October, 2009

  13. Salman A. Khan, Zubair A. Baig: A Simulated Evolution-Tabu search hybrid metaheuristic for routing in computer networks. In Proc. of the IEEE Congress on Evolutionary Computation, Singapore, September, 2007

  14. Zubair A. Baig, M. Baqer, and A. I. Khan. SGSIA - In-Network Data Preprocessing for Secure Grid-Sensor Integration. In, Proc. of the 2nd IEEE International Conference on eScience and Grid Computing, Amsterdam, The Netherlands, December, 2006

  15. Zubair A. Baig, M. Baqer, and A. I. Khan. A Pattern Recognition Scheme for Detecting Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks. In, Proc. of the IEEE International Conference on Pattern Recognition, Hong Kong, China, August, 2006

  16. M. Baqer, A. I. Khan, Zubair A. Baig. Implementing a Graph Neuron Array for Pattern Recognition within Unstructured Wireless Sensor Networks. In Ubiquitous Intelligence and Smart Worlds, December, 2005, Springer-Verlag Lecture Notes in Computer Science: 3164

  17. Zubair A. Baig. Preventing Service Flooding on Internet DNS Servers thru an Application-Level Mechanism-A Performance Analysis. In Proc. of the International Conference on Security and Management, Las Vegas, USA, June, 2005.

  18. Mostafa Abd-El-Barr, Salman A. Khan, Zubair A. Baig. Performance Analysis of a Hybrid Scheme for Tolerating Mobile Support Station Failures. In Proc. of the International Conference on Wireless Networks (ICWN'02), Las Vegas, USA, June, 2002.

National Conference Papers

  1. Abdul Jabbar Siddiqui, Hamza Ijaz Abbasi, Zubair A. Baig. A Multi-Click, multi-cursor graphical password scheme for effective user authentication. The 2nd Saudi Students Conference, Al-Khobar, May, 2012.

  2. Abdul-Rahman I. Ibrahim, Taimoor Aslam, Zubair A. Baig. Design, mplementation and analysis of a map-based graphical password system. The 2nd Saudi Students Conference, Al-Khobar, May, 2012.
     

Theses

  1. Zubair A. Baig. Distributed Denial of Service Attack Detection in Wireless Sensor Networks, PhD Dissertation, Monash University, Melbourne, Australia, September 2008.

  2. Zubair A. Baig. Performance Analysis of an Application-Level Mechanism for Preventing Service Flooding in the Internet. Masters Thesis, University of Maryland, College Park, USA, December 2003.