default search action
Pelin Angin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Iacovos Ioannou, Prabagarane Nagaradjane, Pelin Angin, Palaniappan Balasubramanian, Karthick Jeyagopal Kavitha, Palani Murugan, Vasos Vassiliou:
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening. Comput. Commun. 218: 209-239 (2024) - [j24]Ganapathy Mani, Myeongsu Kim, Bharat K. Bhargava, Pelin Angin, Ayça Deniz, Vikram Pasumarti:
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking. IEEE Trans. Dependable Secur. Comput. 21(4): 2461-2477 (2024) - [c28]Mohamed Aly Amin, Adnan Harun Dogan, Elif Sena Kuru, Yigit Sever, Pelin Angin:
Misuse Detection and Response for Orchestrated Microservices Based Software. AINA (6) 2024: 217-226 - [c27]Münteha Nur Bedir Tüzün, Pelin Angin:
Network Intrusion Detection with Incremental Active Learning. AINA (6) 2024: 344-353 - 2023
- [j23]Ganapathy Mani, Marina Haliem, Bharat K. Bhargava, Indu Manickam, Kevin Kochpatcharin, Myeongsu Kim, Eric D. Vugrin, Weichao Wang, Chris Jenkins, Pelin Angin, Meng Yu:
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense. IEEE Trans. Dependable Secur. Comput. 20(6): 4853-4867 (2023) - [e1]Ilsun You, Hwankuk Kim, Pelin Angin:
Mobile Internet Security - 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers. Communications in Computer and Information Science 1644, Springer 2023, ISBN 978-981-99-4429-3 [contents] - [i1]Ilter Taha Aktolga, Elif Sena Kuru, Yigit Sever, Pelin Angin:
AI-Driven Container Security Approaches for 5G and Beyond: A Survey. CoRR abs/2302.13865 (2023) - 2022
- [j22]Ozan Akin, Umut Can Gulmez, Ozan Sazak, Osman Ufuk Yagmur, Pelin Angin:
GreenSlice: An Energy-Efficient Secure Network Slicing Framework. J. Internet Serv. Inf. Secur. 12(1): 57-71 (2022) - [j21]Aqsa Ayub, Muhammad Rizwan, Shivanshu Shrivastava, Adeel Anjum, Pelin Angin, Yigit Sever:
Securely Offloading Computation to the Edge with the Tangle Cache. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 40-60 (2022) - [j20]Pradeep Kumar Singh, Bharat K. Bhargava, Wei-Chiang Hong, Pelin Angin:
1174: futuristic trends and innovations in multimedia systems using big data, IoT and cloud technologies (FTIMS). Multim. Tools Appl. 81(24): 34439-34445 (2022) - [c26]Ayça Deniz, Merih Angin, Pelin Angin:
Understanding IMF Decision-Making with Sentiment Analysis. SIU 2022: 1-4 - 2021
- [j19]Ayça Deniz, Merih Angin, Pelin Angin:
Evolutionary Multiobjective Feature Selection for Sentiment Analysis. IEEE Access 9: 142982-142996 (2021) - [j18]Ahmed Demirpolat, Alper Kaan Sarica, Pelin Angin:
ProtÉdge: A few-shot ensemble learning approach to software-defined networking-assisted edge security. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [c25]Muhammad Rizwan, Muhammad Noman Sohail, Alia Asheralieva, Adeel Anjum, Pelin Angin:
SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System. Blockchain 2021: 530-537 - [c24]Bharat K. Bhargava, Rohit Ranchal, Pelin Angin:
Privacy-Preserving Data Sharing and Adaptable Service Compositions in Mission-Critical Clouds. ISIC 2021: 60-66 - [c23]Ayça Deniz, Merih Angin, Pelin Angin:
Sentiment and Context-refined Word Embeddings for Sentiment Analysis. SMC 2021: 927-932 - 2020
- [j17]Pelin Angin, Mohammad Hossein Anisi, Furkan Göksel, Ceren Gürsoy, Asaf Büyükgülcü:
AgriLoRa: A Digital Twin Framework for Smart Agriculture. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(4): 77-96 (2020) - [j16]Alper Kaan Sarica, Pelin Angin:
Explainable Security in SDN-Based IoT Networks. Sensors 20(24): 7326 (2020) - [c22]Alper Kaan Sarica, Pelin Angin:
A Novel SDN Dataset for Intrusion Detection in IoT Networks. CNSM 2020: 1-5 - [c21]Manolya Atalay, Pelin Angin:
A Digital Twins Approach to Smart Grid Security Testing and Standardization. MetroInd4.0&IoT 2020: 435-440
2010 – 2019
- 2019
- [j15]Ismail Turk, Pelin Angin, Ahmet Cosar:
RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions. IEEE Access 7: 95327-95340 (2019) - [j14]Emre Süren, Pelin Angin, Nazife Baykal:
I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains. Turkish J. Electr. Eng. Comput. Sci. 27(5): 3713-3728 (2019) - [j13]Emre Süren, Pelin Angin:
Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits. J. Internet Serv. Inf. Secur. 9(1): 24-47 (2019) - [j12]Zeynep Mavus, Pelin Angin:
A Secure Model For Efficient Live Migration of Containers. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(3): 21-44 (2019) - [j11]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:
Big Data Analytics for Cyber Security. Secur. Commun. Networks 2019: 4109836:1-4109836:2 (2019) - [j10]Rohit Ranchal, Bharat K. Bhargava, Pelin Angin, Lotfi Ben Othmane:
EPICS: A Framework for Enforcing Security Policies in Composite Web Services. IEEE Trans. Serv. Comput. 12(3): 415-428 (2019) - [c20]Ege Ciklabakkal, Ataberk Donmez, Mert Erdemir, Emre Süren, Mert Kaan Yilmaz, Pelin Angin:
ARTEMIS: An Intrusion Detection System for MQTT Attacks in Internet of Things. SRDS 2019: 369-371 - [c19]Servio Palacios, K. M. A. Solaiman, Pelin Angin, Alina Nesen, Bharat K. Bhargava, Zachary Collins, Aaron Sipser, Michael Stonebraker, James MacDonald:
WIP - SKOD: A Framework for Situational Knowledge on Demand. Poly/DMAH@VLDB 2019: 154-166 - [c18]Goksel Simsek, Hakan Bostan, Alper Kaan Sarica, Egemen Sarikaya, Alperen Keles, Pelin Angin, Hande Alemdar, Ertan Onur:
DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN. WISA 2019: 55-66 - [p1]Ahmet Erdem, Sevgi Özkan Yildirim, Pelin Angin:
Blockchain Blockchain for Ensuring Security Security , Privacy Privacy , and Trust Trust in IoT IoT Environments: The State of the Art. Security, Privacy and Trust in the IoT Environment 2019: 97-122 - 2018
- [j9]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:
A self-protecting agents based model for high-performance mobile-cloud computing. Comput. Secur. 77: 380-396 (2018) - [c17]Ganapathy Mani, Bharat K. Bhargava, Pelin Angin, Miguel Villarreal-Vasquez, Denis A. Ulybyshev, Jason Kobes:
Machine Learning Models to Enhance the Science of Cognitive Autonomy. AIKE 2018: 46-53 - [c16]Halim Görkem Gülmez, Emrah Tuncel, Pelin Angin:
A Big Data Analytical Approach to Cloud Intrusion Detection. CLOUD 2018: 377-388 - [c15]Pelin Angin, Melih Burak Mert, Okan Mete, Azer Ramazanli, Kaan Sarica, Bora Gungoren:
A Blockchain-Based Decentralized Security Architecture for IoT. ICIOT 2018: 3-18 - 2017
- [c14]Ruchith Fernando, Rohit Ranchal, Bharat K. Bhargava, Pelin Angin:
A Monitoring Approach for Policy Enforcement in Cloud Services. CLOUD 2017: 600-607 - [c13]Miguel Villarreal-Vasquez, Bharat K. Bhargava, Pelin Angin, Noor Ahmed, Daniel Goodwin, Kory Brin, Jason Kobes:
An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems. CLOUD 2017: 723-726 - [c12]Miguel Villarreal-Vasquez, Bharat K. Bhargava, Pelin Angin:
Adaptable Safety and Security in V2X Systems. ICIOT 2017: 17-24 - [c11]Rohit Ranchal, Sidak Pal Singh, Pelin Angin, Ajay Mohindra, Hui Lei, Bharat K. Bhargava:
RaaS and Hierarchical Aggregation Revisited. ICWS 2017: 41-48 - 2016
- [j8]Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin:
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(1): 79-96 (2016) - [c10]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:
Tamper-resistant autonomous agents-based mobile-cloud computing. NOMS 2016: 843-847 - 2015
- [j7]Yuhui Zhong, Bharat K. Bhargava, Yi Lu, Pelin Angin:
A Computational Dynamic Trust Model for User Authorization. IEEE Trans. Dependable Secur. Comput. 12(1): 1-15 (2015) - [c9]Pelin Angin, Bharat K. Bhargava, Zhongjun Jin:
A Self-Cloning Agents Based Model for High-Performance Mobile-Cloud Computing. CLOUD 2015: 301-308 - [c8]Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Sunil Lingayat:
A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing. SRDS Workshop 2015: 31-35 - [c7]Leszek T. Lilien, Lotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava, Raed M. Salih, Andrew DeCarlo:
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks. SRDS Workshop 2015: 57-61 - 2014
- [j6]Leszek Lilien, Lotfi Ben Othmane, Pelin Angin, Andrew DeCarlo, Raed M. Salih, Bharat K. Bhargava:
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks. J. Netw. Comput. Appl. 38: 3-15 (2014) - [j5]Lotfi Ben Othmane, Pelin Angin, Harold Weffers, Bharat K. Bhargava:
Extending the Agile Development Process to Develop Acceptably Secure Software. IEEE Trans. Dependable Secur. Comput. 11(6): 497-509 (2014) - [c6]Lotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava:
Using Assurance Cases to Develop Iteratively Security Features Using Scrum. ARES 2014: 490-497 - 2013
- [b1]Pelin Angin:
Autonomous agents-based mobile-cloud computing. Purdue University, USA, 2013 - [j4]Lotfi Ben Othmane, Harold Weffers, Pelin Angin, Bharat K. Bhargava:
A time-evolution model for the privacy degree of information disseminated in online social networks. Int. J. Commun. Networks Distributed Syst. 11(4): 412-430 (2013) - [j3]Pelin Angin, Bharat K. Bhargava:
An Agent-based Optimization Framework for Mobile-Cloud Computing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 1-17 (2013) - [c5]Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad:
A Case for Societal Digital Security Culture. SEC 2013: 391-404 - 2012
- [j2]Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Ranjitkumar Sivakumar, Asher Sinclair, Mark Linderman:
A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs. Int. J. Next Gener. Comput. 3(1) (2012) - [c4]Mehdi Azarmi, Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Norman Ahmed, Asher Sinclair, Mark Linderman, Lotfi Ben Othmane:
An End-to-End Security Auditing Approach for Service Oriented Architectures. SRDS 2012: 279-284 - 2011
- [j1]Pelin Angin:
Real-time Mobile-Cloud Computing for Context- Aware Blind Navigation. Int. J. Next Gener. Comput. 2(2) (2011) - 2010
- [c3]Pelin Angin, Bharat K. Bhargava, Sumi Helal:
A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation. Mobile Data Management 2010: 396-401 - [c2]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, Lotfi Ben Othmane, Leszek Lilien:
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing. SRDS 2010: 177-183
2000 – 2009
- 2008
- [c1]Pelin Angin, Jennifer Neville:
A Shrinkage Approach for Modeling Non-stationary Relational Autocorrelation. ICDM 2008: 707-712
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint