Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Dr Zubair Baig

Dr Zubair Baig is a Senior Lecturer within the School of Science and a member of the ECU Security Research Institute.

Current Teaching

  • CSG6223 Network Forensics
  • CSI6116 Network Security

Professional Associations

  • IEEE
  • Australian Computer Society
  • Australian Information Security Association

Awards and Recognition

Other

  • IEEE Best Student Award - 2002

Research Areas and Interests

  • Network Attack Modelling and Detection, Machine Learning, Digital Forensics

Qualifications

  • Doctor of Philosophy, Monash University, 2008.
  • Master of Science Electrical Engineering, United States of America, 2003.
  • Bachelor of Science in Computer Engineering, Saudi Arabia, 2002.

Research

Recent Research Grants

  • Academic Centre of Cyber Security Excellence,  Department of Education and Training,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • Investigation of social media for radicalisation and terrorism in the Maldives,  Edith Cowan University,  Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 ? 2017,  2017,  $11,000.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.

Recent Publications (within the last five years)

Journal Articles

  • Chernyshev, M., Zeadally, S., Baig, Z., Woodward, A., (2017), Mobile Forensics: Advances, Challenges, and Research Opportunities. IEEE Security and Privacy Magazine, 15(6), 42-51, DOI: 10.1109/MSP.2017.4251107.
  • Adi, E., Baig, Z., Hingston, P., (2017), Stealthy Denial of Service (DoS) Attack Modelling and Detection for HTTP/2 Services. Journal of Network and Computer Applications, 91(1 August 2017), 1-13, DOI: 10.1016/j.jnca.2017.04.015.
  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  • Adi, E., Baig, Z., Hingston, P., Lam, P., (2016), Distributed denial-of-service attacks against HTTP/2 services. Cluster Computing, 19(1), 79-86, Springer New York LLC, DOI: 10.1007/s10586-015-0528-7.
  • Zeadally, S., Isaac, J., Baig, Z., (2016), Security Attacks and Solutions in Electronic Health (E-health) Systems. Journal of Medical Systems, 40(12), Article no. 263, New York, USA, Springer New York LLC, DOI: 10.1007/s10916-016-0597-z.
  • Baig, Z., Sait, S., Binbeshr, F., (2016), Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Computer Networks, 97(1), 31-47, Amsterdam, Netherlands, Elsevier BV, DOI: 10.1016/j.comnet.2016.01.002.
  • Alsowail, S., Sqalli, M., Abu-Amara, M., Baig, Z., Salah, K., (2016), An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud. Arabian Journal for Science and Engineering, 41(12), 5037-5047, Springer Verlag, DOI: 10.1007/s13369-016-2210-7.
  • Baig, Z., Salah, K., (2016), Distributed hierarchical pattern-matching for network intrusion detection. Journal of Internet Technology, 17(2), 167-178, Hualien, Taiwan, National Dong Hwa University, DOI: 10.6138/JIT.2016.17.2.20131021.
  • Al-Madani, B., Khan, Au., Baig, Z., (2014), A Novel Mobility-Aware Data Transfer Service (MADTS) Based on DDS Standards. Arabian Journal for Science and Engineering Section B: Engineering, 39(4), 2843-2856, Springer, DOI: 10.1007/s13369-014-0944-7.
  • Al-Madani, B., Al-Roubaiey, A., Baig, Z., (2014), Real-Time QoS-Aware video streaming: A comparative and experimental study. Advances In Multimedia, 1(1), article no.164940, New York, USA, Hindawi, DOI: 10.1155/2014/164940.
  • Baig, Z., Amoudi, A., (2013), An Analysis of Smart Grid Attacks and Countermeasures. Journal of Communications, 8(8), 473-479, United States, Engineering and Technology Publishing, DOI: 10.12720/jcm.8.8.473-479.
  • Salah, K., Hamodi, J., Baig, Z., Al-Haidari, F., (2013), SIP VoIP Deployment over Hospitality Networks. Journal of Internet Technology, 14(1), 31-44, Taiwan, Republic of China, National Dong Hwa University Computer Center, DOI: 10.6138/JIT.2013.14.1.04.
  • Baig, Z., Sait, S., Shaheen, A., (2013), GMDH-based Networks for Intelligent Intrusion Detection. Engineering Applications of Artificial Intelligence, 26(7), 1731-1740, United Kingdom, Pergamon, DOI: 10.1016/j.engappai.2013.03.008.

Conference Publications

  • Rabadia, P., Valli, C., Ibrahim, A., Baig, Z., (2017), Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference, 10p., Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a839e6d1d283.
  • Syed, N., Baig, Z., Valli, C., Ibrahim, A., (2017), Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. iThings-GreenCom-CPSCom-SmartData 2017, 748-755.
  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360? 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, Springer Verlag, DOI: 10.1007/978-3-319-47063-4_2.
  • Hampton, N., Baig, Z., (2016), Timestamp Analysis for Quality Validation of Network Forensic Data. Network and System Security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, LNCS9955(28-30 Sep, 2016), 235-248, Springer, DOI: 10.1007/978-3-319-46298-1_16.
  • Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17, IARIA.
  • Baig, Z., Al Amoudy, A., Salah, K., (2015), Detection of compromised smart meters in the advanced metering infrastructure. Proceedings of the 8th IEEE GCC Conference and Exhibition, Article number 7060073, IEEE, DOI: 10.1109/IEEEGCC.2015.7060073.
  • Adi, E., Baig, Z., Lam, P., Hingston, P., (2015), Low-rate denial-of-service attacks against HTTP/2 services. 2015 5th International Conference on IT Convergence and Security (ICITCS): Proceedings, Article num 7292994, IEEE, DOI: 10.1109/ICITCS.2015.7292994.
  • Baqais, AA., Alshayeb, M., Baig, Z., (2014), Hybrid intelligent model for software maintenance prediction. Lecture Notes in Engineering and Computer Science, 1 LNECS(3-5 July 2013), 358-362, London, U.K., Springer.
  • Baig, Z., (2014), Securing the Internet of Things Infrastructure - Standards and Techniques. The Proceedings of 12th Australian Information Security Management Conference, 75-81, Perth, W.A., Edith Cowan University, DOI: 10.4225/75/57b6651c343d6.
  • Baig, Z., Binbeshr, F., (2013), Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks Against Cloud Infrastructures. Proceedings 2013 International Conference on Cloud Computing and Big Data CloudCom-Asia 2013, 346-353, Piscataway, NJ, USA, Conference Publishing Services, DOI: 10.1109/CLOUDCOM-ASIA.2013.51.
  • Baig, Z., Ahmad, S., Sait, S., (2013), Detecting intrusive activity in the smart grid communications infrastructure using self-organizing maps. Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 1594-1599, Piscataway, NJ, USA, IEEE, DOI: 10.1109/TrustCom.2013.196.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy,  Denial-of-service Attack Modelling And Detection For Http / 2 Services
  • Master of Science (Computer Science),  An Assessment Of Static And Dynamic Malware Analysis Techniques For The Android Platform

Associate Supervisor

  • Doctor of Philosophy,  Enterprise Security Assessment And Operation Analysis Using Distributed Computing And Information Fusion Techniques
Skip to top of page