Pelin Angin

Orcid: 0000-0002-6419-2043

According to our database1, Pelin Angin authored at least 53 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Network Intrusion Detection with Incremental Active Learning.
Proceedings of the Advanced Information Networking and Applications, 2024

Misuse Detection and Response for Orchestrated Microservices Based Software.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense.
IEEE Trans. Dependable Secur. Comput., 2023

AI-Driven Container Security Approaches for 5G and Beyond: A Survey.
CoRR, 2023

2022
1174: futuristic trends and innovations in multimedia systems using big data, IoT and cloud technologies (FTIMS).
Multim. Tools Appl., 2022

GreenSlice: An Energy-Efficient Secure Network Slicing Framework.
J. Internet Serv. Inf. Secur., 2022

Understanding IMF Decision-Making with Sentiment Analysis.
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022

2021
ProtÉdge: A few-shot ensemble learning approach to software-defined networking-assisted edge security.
Trans. Emerg. Telecommun. Technol., 2021

Evolutionary Multiobjective Feature Selection for Sentiment Analysis.
IEEE Access, 2021

Sentiment and Context-refined Word Embeddings for Sentiment Analysis.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Privacy-Preserving Data Sharing and Adaptable Service Compositions in Mission-Critical Clouds.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Explainable Security in SDN-Based IoT Networks.
Sensors, 2020

AgriLoRa: A Digital Twin Framework for Smart Agriculture.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

A Digital Twins Approach to Smart Grid Security Testing and Standardization.
Proceedings of the 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020

A Novel SDN Dataset for Intrusion Detection in IoT Networks.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
EPICS: A Framework for Enforcing Security Policies in Composite Web Services.
IEEE Trans. Serv. Comput., 2019

Big Data Analytics for Cyber Security.
Secur. Commun. Networks, 2019

A Secure Model For Efficient Live Migration of Containers.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits.
J. Internet Serv. Inf. Secur., 2019

I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains.
Turkish J. Electr. Eng. Comput. Sci., 2019

RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions.
IEEE Access, 2019

DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN.
Proceedings of the Information Security Applications - 20th International Conference, 2019

WIP - SKOD: A Framework for Situational Knowledge on Demand.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

ARTEMIS: An Intrusion Detection System for MQTT Attacks in Internet of Things.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Blockchain Blockchain for Ensuring Security Security , Privacy Privacy , and Trust Trust in IoT IoT Environments: The State of the Art.
Proceedings of the Security, Privacy and Trust in the IoT Environment, 2019

2018
A self-protecting agents based model for high-performance mobile-cloud computing.
Comput. Secur., 2018

A Blockchain-Based Decentralized Security Architecture for IoT.
Proceedings of the Internet of Things - ICIOT 2018, 2018

A Big Data Analytical Approach to Cloud Intrusion Detection.
Proceedings of the Cloud Computing - CLOUD 2018, 2018

Machine Learning Models to Enhance the Science of Cognitive Autonomy.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

2017
RaaS and Hierarchical Aggregation Revisited.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Adaptable Safety and Security in V2X Systems.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

A Monitoring Approach for Policy Enforcement in Cloud Services.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Tamper-resistant autonomous agents-based mobile-cloud computing.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
A Computational Dynamic Trust Model for User Authorization.
IEEE Trans. Dependable Secur. Comput., 2015

Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

A Self-Cloning Agents Based Model for High-Performance Mobile-Cloud Computing.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Extending the Agile Development Process to Develop Acceptably Secure Software.
IEEE Trans. Dependable Secur. Comput., 2014

A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.
J. Netw. Comput. Appl., 2014

Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Autonomous agents-based mobile-cloud computing ()
PhD thesis, 2013

An Agent-based Optimization Framework for Mobile-Cloud Computing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

A time-evolution model for the privacy degree of information disseminated in online social networks.
Int. J. Commun. Networks Distributed Syst., 2013

A Case for Societal Digital Security Culture.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs.
Int. J. Next Gener. Comput., 2012

An End-to-End Security Auditing Approach for Service Oriented Architectures.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

2011
Real-time Mobile-Cloud Computing for Context- Aware Blind Navigation.
Int. J. Next Gener. Comput., 2011

2010
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

2008
A Shrinkage Approach for Modeling Non-stationary Relational Autocorrelation.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008


  Loading...