Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Dr Zubair Baig

Senior Lecturer

Contact Information Telephone: +61 8 6304 2820, Mobile: 0402034062, Email:, Campus: Joondalup, Room: JO18.316
Staff Member Details
Telephone: +61 8 6304 2820
Mobile: 0402034062
Campus: Joondalup  
Room: JO18.316  


Dr Zubair Baig is a Senior Lecturer within the School of Science and a member of the ECU Security Research Institute.

Current Teaching

  • CSG6223 Network Forensics
  • CSI6116 Network Security

Professional Associations

  • IEEE
  • Australian Computer Society
  • Australian Information Security Association

Awards and Recognition


  • IEEE Best Student Award - 2002

Research Areas and Interests

  • Network Attack Modelling and Detection, Machine Learning, Digital Forensics


  • Doctor of Philosophy, Monash University, 2008.
  • Master of Science Electrical Engineering, United States of America, 2003.
  • Bachelor of Science in Computer Engineering, Saudi Arabia, 2002.


Recent Research Grants

  • Academic Centre of Cyber Security Excellence,  Department of Education and Training,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • Investigation of social media for radicalisation and terrorism in the Maldives,  Edith Cowan University,  Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 ? 2017,  2017,  $11,000.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.

Recent Publications (within the last five years)

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  • Adi, E., Baig, Z., Hingston, P., (2017), Stealthy Denial of Service (DoS) Attack Modelling and Detection for HTTP/2 Services. Journal of Network and Computer Applications, 91(1 August 2017), 1-13, DOI: 10.1016/j.jnca.2017.04.015.
  • Zeadally, S., Isaac, J., Baig, Z., (2016), Security Attacks and Solutions in Electronic Health (E-health) Systems. Journal of Medical Systems, 40(12), Article no. 263, New York, USA, Springer New York LLC, DOI: 10.1007/s10916-016-0597-z.
  • Alsowail, S., Sqalli, M., Abu-Amara, M., Baig, Z., Salah, K., (2016), An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud. Arabian Journal for Science and Engineering, 41(12), 5037-5047, Springer Verlag, DOI: 10.1007/s13369-016-2210-7.
  • Baig, Z., Salah, K., (2016), Distributed hierarchical pattern-matching for network intrusion detection. Journal of Internet Technology, 17(2), 167-178, Hualien, Taiwan, National Dong Hwa University, DOI: 10.6138/JIT.2016.17.2.20131021.
  • Adi, E., Baig, Z., Hingston, P., Lam, P., (2016), Distributed denial-of-service attacks against HTTP/2 services. Cluster Computing, 19(1), 79-86, Springer New York LLC, DOI: 10.1007/s10586-015-0528-7.
  • Baig, Z., Sait, S., Binbeshr, F., (2016), Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Computer Networks, 97(1), 31-47, Amsterdam, Netherlands, Elsevier BV, DOI: 10.1016/j.comnet.2016.01.002.
  • Al-Madani, B., Khan, Au., Baig, Z., (2014), A Novel Mobility-Aware Data Transfer Service (MADTS) Based on DDS Standards. Arabian Journal for Science and Engineering Section B: Engineering, 39(4), 2843-2856, Springer, DOI: 10.1007/s13369-014-0944-7.
  • Al-Madani, B., Al-Roubaiey, A., Baig, Z., (2014), Real-Time QoS-Aware video streaming: A comparative and experimental study. Advances In Multimedia, 1(1), article no.164940, New York, USA, Hindawi, DOI: 10.1155/2014/164940.
  • Baig, Z., Amoudi, A., (2013), An Analysis of Smart Grid Attacks and Countermeasures. Journal of Communications, 8(8), 473-479, United States, Engineering and Technology Publishing, DOI: 10.12720/jcm.8.8.473-479.
  • Baig, Z., Sait, S., Shaheen, A., (2013), GMDH-based Networks for Intelligent Intrusion Detection. Engineering Applications of Artificial Intelligence, 26(7), 1731-1740, United Kingdom, Pergamon, DOI: 10.1016/j.engappai.2013.03.008.
  • Salah, K., Hamodi, J., Baig, Z., Al-Haidari, F., (2013), SIP VoIP Deployment over Hospitality Networks. Journal of Internet Technology, 14(1), 31-44, Taiwan, Republic of China, National Dong Hwa University Computer Center, DOI: 10.6138/JIT.2013.14.1.04.
  • Salah, K., Hamodi, J., Baig, Z., Al-Haidari, F., (2012), Video?on?Demand (VoD) deployment over hospitality networks. International Journal of Network Management, 22(1), 65-80, United Kingdom, John Wiley & Sons, DOI: 10.1002/nem.787.
  • Baig, Z., (2012), Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching. International Journal of Security and Networks, 7(2), 83-94, Inderscience Enterprises, DOI: 10.1504/IJSN.2012.050025.
  • Ahmad, S., Baig, Z., (2012), Fuzzy-Based Optimization for Effective Detection of Smart Grid Cyber-Attacks. International Journal of Smart Grid and Clean Energy, 1(1), 15-21, DOI: 10.12720/sgce.1.1.15-21.
  • Baig, Z., (2012), Multi-Agent Systems for Protecting Critical Infrastructures: A Survey. Journal of Network and Computer Applications, 35(3), 1151-1161, United Kingdom, Elsevier, DOI: 10.1016/j.jnca.2012.01.006.

Conference Publications

  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360? 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, Springer Verlag, DOI: 10.1007/978-3-319-47063-4_2.
  • Hampton, N., Baig, Z., (2016), Timestamp Analysis for Quality Validation of Network Forensic Data. Network and System Security, 235-248, DOI: 10.1007/978-3-319-46298-1_16.
  • Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17, IARIA.
  • Adi, E., Baig, Z., Lam, P., Hingston, P., (2015), Low-rate denial-of-service attacks against HTTP/2 services. 2015 5th International Conference on IT Convergence and Security (ICITCS): Proceedings, Article num 7292994, IEEE, DOI: 10.1109/ICITCS.2015.7292994.
  • Baig, Z., Al Amoudy, A., Salah, K., (2015), Detection of compromised smart meters in the advanced metering infrastructure. Proceedings of the 8th IEEE GCC Conference and Exhibition, Article number 7060073, IEEE, DOI: 10.1109/IEEEGCC.2015.7060073.
  • Baig, Z., (2014), Securing the Internet of Things Infrastructure - Standards and Techniques. The Proceedings of 12th Australian Information Security Management Conference, 75-81, Perth, W.A., Edith Cowan University.
  • Baqais, AA., Alshayeb, M., Baig, Z., (2014), Hybrid intelligent model for software maintenance prediction. Lecture Notes in Engineering and Computer Science, 1 LNECS(3-5 July 2013), 358-362, London, U.K., Springer.
  • Baig, Z., Ahmad, S., Sait, S., (2013), Detecting intrusive activity in the smart grid communications infrastructure using self-organizing maps. Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 1594-1599, Piscataway, NJ, USA, IEEE, DOI: 10.1109/TrustCom.2013.196.
  • Baig, Z., Binbeshr, F., (2013), Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks Against Cloud Infrastructures. Proceedings 2013 International Conference on Cloud Computing and Big Data CloudCom-Asia 2013, 346-353, Piscataway, NJ, USA, Conference Publishing Services.
  • El-Alfy, EM., Abdel-Aal, RE., Baig, Z., (2012), Abductive neural network modeling for hand recognition using geometric features. Neural Information Processing: 19th International Conference, ICONIP 2012, Proceedings, Part IV, LNCS 7666(12-15 Nov, 2012), 593-602, Heidelberg, Germany, Springer, DOI: 10.1007/978-3-642-34478-7_72.
  • Baig, Z., Ahmad, S., (2012), Device implant attack detection for the Smart Grid Infrastructure. Proceedings - 2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012, 1062-1067, Institute of Electrical and Electronics Engineers Inc..

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy,  Denial-of-service Attack Modelling And Detection For Http / 2 Services
  • Master of Science (Computer Science),  An Assessment Of Static And Dynamic Malware Analysis Techniques For The Android Platform

Associate Supervisor

  • Doctor of Philosophy,  Enterprise Security Assessment And Operation Analysis Using Distributed Computing And Information Fusion Techniques
Skip to top of page