ORCID Profile
0000-0002-9245-2703
Current Organisation
Deakin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Elsevier BV
Date: 2019
Publisher: Springer International Publishing
Date: 2019
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: ACM
Date: 18-08-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: IEEE
Date: 02-2015
Publisher: Wiley
Date: 14-07-2011
DOI: 10.1002/NEM.787
Publisher: Elsevier BV
Date: 2020
Publisher: Elsevier BV
Date: 03-2011
Publisher: Springer Science and Business Media LLC
Date: 11-10-2016
DOI: 10.1007/S10916-016-0597-Z
Abstract: For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.
Publisher: IEEE
Date: 09-2007
Publisher: Springer Science and Business Media LLC
Date: 11-01-2016
Publisher: Springer Science and Business Media LLC
Date: 19-03-2019
Publisher: Elsevier BV
Date: 05-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: IEEE
Date: 10-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2018
Publisher: IEEE
Date: 12-2019
Publisher: Springer Science and Business Media LLC
Date: 11-05-2020
Publisher: IEEE
Date: 2010
DOI: 10.1109/ICFN.2010.73
Publisher: MDPI AG
Date: 09-09-2019
DOI: 10.3390/FI11090194
Abstract: Bluetooth technology started off as a wireless, short-range cable replacement technology but it has undergone significant developments over the last two decades. Bluetooth radios are currently embedded in almost all computing devices including personal computers, smart phones, smart watches, and even micro-controllers. For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the last 25 years. We also discuss related issues (including security) and Bluetooth as a driving technology for the Internet of Things (IoT). Finally, we also present recent research results obtained with Bluetooth technology in various application areas.
Publisher: Computers, Materials and Continua (Tech Science Press)
Date: 2018
Publisher: Elsevier BV
Date: 06-2018
Publisher: IEEE
Date: 07-2010
Publisher: Inderscience Publishers
Date: 2010
Publisher: Springer Science and Business Media LLC
Date: 28-11-2018
DOI: 10.1007/S10916-018-1123-2
Abstract: While the healthcare industry is undergoing disruptive digital transformation, data breaches involving health information are not usually the result of integration of new technologies. Based on published industry reports, fundamental security safeguards are still considered to be lacking with many documented data breaches occurring as the result of device and equipment theft, human error, hacking, ransomware attacks and misuse. Health information is considered to be one of the most attractive targets for cybercriminals due to its inherent sensitivity, but digital investigations of incidents involving health information are often constrained by the lack of the necessary infrastructure forensic readiness. Following the analysis of healthcare data breach causes and threats, we describe the associated digital forensic readiness challenges in the context of the most significant incident causes. With specific focus on privilege misuse, we present a conceptual architecture for forensic audit logging to assist with capture of the relevant digital artefacts in support of possible future digital investigations.
Publisher: Institution of Engineering and Technology (IET)
Date: 2010
Publisher: Engineering and Technology Publishing
Date: 2013
Publisher: Hindawi Limited
Date: 2014
DOI: 10.1155/2014/164940
Abstract: Due to its flexibility, scalability, real-time, and rich QoS features, Data Distribution Service (DDS) middleware provides seamless integration with high-performance, real-time, and mission-critical networks. Unlike traditional client-server communication models, DDS is based on the publish/subscribe communication model. DDS improves video streaming quality through its efficient and high-performance data delivery mechanism. This paper studies and investigates how DDS is suitable for streaming real-time full-motion video over a communication network. Experimental studies are conducted to compare video streaming using a the VLC player with the DDS overlay. Our results depict the superiority of DDS in provisioning quality video streams at the cost of low network bandwidth. The results also show that DDS is more scalable and flexible and is a promised technology for video distribution over IP networks where it uses much less bandwidth while maintaining high quality video stream delivery.
Publisher: Inderscience Publishers
Date: 2019
Publisher: IEEE
Date: 11-2011
Publisher: IEEE
Date: 12-2013
Publisher: Inderscience Publishers
Date: 2012
Publisher: Elsevier BV
Date: 08-2013
Publisher: Elsevier BV
Date: 02-2021
Publisher: Security Research Institute (SRI), Edith Cowan University
Date: 2014
Publisher: IEEE
Date: 06-2017
Publisher: Springer International Publishing
Date: 2016
Publisher: Springer Science and Business Media LLC
Date: 26-05-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 07-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: ACM Press
Date: 2009
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11596042_22
Publisher: Elsevier BV
Date: 08-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Springer Science and Business Media LLC
Date: 07-02-2014
Publisher: Elsevier BV
Date: 03-2016
Publisher: Wiley
Date: 21-01-2010
Publisher: IEEE
Date: 10-2011
DOI: 10.1109/CW.2011.35
Publisher: IEEE
Date: 12-2006
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2019
Publisher: Elsevier BV
Date: 09-2017
Publisher: IEEE
Date: 12-2011
Publisher: IEEE
Date: 08-2015
Publisher: Springer International Publishing
Date: 2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: IEEE
Date: 2006
Publisher: Deakin University
Date: 2013
No related grants have been discovered for Zubair Baig.