Pelin Angin
Orcid: 0000-0002-6419-2043
According to our database1,
Pelin Angin
authored at least 56 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking.
IEEE Trans. Dependable Secur. Comput., 2024
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening.
Comput. Commun., 2024
Proceedings of the Advanced Information Networking and Applications, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
2022
1174: futuristic trends and innovations in multimedia systems using big data, IoT and cloud technologies (FTIMS).
Multim. Tools Appl., 2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
J. Internet Serv. Inf. Secur., 2022
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022
2021
ProtÉdge: A few-shot ensemble learning approach to software-defined networking-assisted edge security.
Trans. Emerg. Telecommun. Technol., 2021
IEEE Access, 2021
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
Privacy-Preserving Data Sharing and Adaptable Service Compositions in Mission-Critical Clouds.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021
SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Proceedings of the 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020
Proceedings of the 16th International Conference on Network and Service Management, 2020
2019
IEEE Trans. Serv. Comput., 2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
J. Internet Serv. Inf. Secur., 2019
I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains.
Turkish J. Electr. Eng. Comput. Sci., 2019
IEEE Access, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019
Blockchain Blockchain for Ensuring Security Security , Privacy Privacy , and Trust Trust in IoT IoT Environments: The State of the Art.
Proceedings of the Security, Privacy and Trust in the IoT Environment, 2019
2018
Comput. Secur., 2018
Proceedings of the Internet of Things - ICIOT 2018, 2018
Proceedings of the Cloud Computing - CLOUD 2018, 2018
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018
2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015
A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.
J. Netw. Comput. Appl., 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
A time-evolution model for the privacy degree of information disseminated in online social networks.
Int. J. Commun. Networks Distributed Syst., 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
2012
A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs.
Int. J. Next Gener. Comput., 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
2011
Int. J. Next Gener. Comput., 2011
2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
2008
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008