Below is a list of my publications. I will not provide the article sources on this page due to copyright issues unless the publisher follows an open access model,
but please feel free to contact me via email for your requests.
Book chapters
- Vehicular Edge Computing Security. M.A. Eken, P. Angin. Secure Edge Computing: Applications, Techniques and Challenges, CRC Press, in press.
- Blockchain for Ensuring Security, Privacy, and Trust in IoT Environments: The State of the Art. A. Erdem, S.Ö. Yildirim, P. Angin. Security, Privacy and Trust in the IoT Environment, Springer, pp. 97-122, 2019.
Journal publications
- Explainable Security in SDN-Based IoT Networks. A.K. Sarica, P. Angin. Sensors, Vol. 20, No. 24, 7326, 2020.
- Protedge: A few-shot ensemble learning approach to software-defined networking-assisted edge security. A. Demirpolat, A.K. Sarica, P. Angin. Transactions on Emerging Telecommunications Technologies, In press.
- RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions. I. Turk, P. Angin, A. Cosar. IEEE Access, Vol. 7, pp. 95327-95340, 2019.
- A Secure Model for Efficient Live Migration of Containers. Z. Mavus, P. Angin. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 10, No. 3, pp. 21-44, 2019.
- Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits. E. Suren, P. Angin. Journal of Internet Services and Information Security, Vol. 9, No. 1, pp. 24-47, 2019.
- I See EK: A Lightweight Technique to Reveal Exploit Kit Family by Overall URL Patterns of Infection Chains. E. Suren, P. Angin, N. Baykal. TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES, Vol. 27, pp. 3713-3728, 2019.
- EPICS: A Framework for Enforcing Security Policies in Composite Web Services. R. Ranchal, B. Bhargava, P. Angin, L. ben Othmane. IEEE Transactions on Services Computing, Vol. 12, No. 3, pp. 415-428, 2019.
- A Self-Protecting Agents Based Model for High-Performance Mobile-Cloud Computing. P. Angin, B. Bhargava, R. Ranchal. Computers & Security, Vol. 77, pp. 380-396, 2018.
- A Systematic Approach for Attack Analysis and Mitigation in V2V Networks. B. Bhargava, A.M. Johnson, G.I. Munyengabe, P. Angin. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 7, No. 1, pp. 79-96, 2016.
- A Computational Dynamic Trust Model for User Authorization. Y. Zhong, B. Bhargava, Y. Lu, P. Angin. IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 12, No. 1, pp. 1-15, 2015.
- Extending the Agile Development Approach to Develop Acceptably Secure Software. L. ben Othmane, P. Angin, H. Weffers, B. Bhargava. IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 11, No. 6, pp. 497-509, 2014.
- A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks. L. Lilien, L. ben Othmane, P. Angin, A. DeCarlo, R. Salih, B. Bhargava. Elsevier Journal of Network and Computer Applications, Vol. 38, pp. 3-15, 2014.
- An Agent-based Optimization Framework for Mobile-Cloud Computing. P. Angin and B. Bhargava. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 4, No. 2, pp. 1-17, 2013.
- A Time-Evolution Model for the Privacy Degree of Information Disseminated in Online Social Networks. L. ben Othmane, H. Weffers, P. Angin, B. Bhargava. International Journal of Communication Networks and Distributed Systems, Vol. 11, No. 4, pp. 412-430, 2013.
- A Confidence Ranked Co-Occurrence Approach for Accurate Object Recognition in Highly Complex Scenes. P. Angin, B. Bhargava. Journal of Internet Technology, Vol. 14, No. 1, 2013.
- A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs. B. Bhargava, P. Angin, R Sivakumar, R. Ranchal, M. Linderman, A. Sinclair. International Journal of Next Generation Computing, Vol. 3, No. 1, 2012.
- Real-time Mobile-Cloud Computing for Context-Aware Blind Navigation. P. Angin, B. Bhargava. International Journal of Next Generation Computing, Vol. 2, No. 2, 2011.
Peer-reviewed conference/workshop proceeding publications
- Machine Learning Models to Enhance the Science of Cognitive Autonomy. G. Mani, B. Bhargava, P. Angin, M. Villarreal-Vasquez, D. Ulybyshev, J. Kobes. IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AIKE 2018), pp. 46-53, 2018.
- Tamper-Resistant Autonomous Agents-Based Mobile-Cloud Computing. P. Angin, B. Bhargava, R. Ranchal. IEEE/IFIP Network Operations and Management Symposium (NOMS'16), pp. 843-847, 2016.
- A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing. B. Bhargava, P. Angin, R. Ranchal, S. Lingayat. 6th International Workshop on Dependable Network Computing and Mobile Systems (DNCMS) (in conjunction with SRDS'15), pp. 31-35, 2015. (Best paper award)
- Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks. L. Lilien, L. ben Othmane, P. Angin, B. Bhargava, R. Salih, A. DeCarlo. 6th International Workshop on Dependable Network Computing and Mobile Systems (DNCMS) (in conjunction with SRDS'15), pp. 57-61, 2015.
- A Self-Cloning Agents Based Model for High-Performance Mobile-Cloud Computing. P. Angin, B. Bhargava, Z. Jin. 8th IEEE International Conference on Cloud Computing (CLOUD'15), pp. 301-308, 2015.
- Using Assurance Cases to Develop Iteratively Security Features Using Scrum. L. ben Othmane, P. Angin, B. Bhargava. 1st International Software Assurance Workshop (in conjunction with ARES'14), pp. 490-497, 2014.
- A Case for Societal Digital Security Culture. L. ben Othmane, H. Weffers, R. Ranchal, P. Angin, B. Bhargava, M.M. Mohamad. 28th IFIP TC 11 International Conference, SEC'13, pp. 391-404, 2013.
- An End-to-End Security Auditing Approach for Service Oriented Architectures. M. Azarmi, B. Bhargava, P. Angin, R. Ranchal, N. Ahmed, A. Sinclair, M. Linderman, L. ben Othmane. 31st IEEE International Symposium on Reliable Distributed Systems (SRDS'12), pp. 279-284, 2012.
- An Entity-centric Approach for Privacy and Identity Management in Cloud Computing. P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. ben Othmane, L. Lilien, M. Linderman. 29th IEEE International Symposium on Reliable Distributed Systems (SRDS'10), pp. 177-183, 2010.
- A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation. P. Angin, B. Bhargava, S. Helal. 11th International Conference on Mobile Data Management (MDM), pp. 396-401, 2010.
- A Shrinkage Approach for Modeling Nonstationary Relational Autocorrelation. P. Angin, J. Neville. 8th IEEE International Conference on Data Mining (ICDM), pp. 707-712, 2008.
- A Shrinkage Approach for Modeling Nonstationary Relational Autocorrelation. P. Angin, J. Neville. 2nd SIGKDD ACM Workshop on Social Network Mining and Analysis (in conjunction with KDD'08), 2008.
Technical reports
- B. Bhargava, M. Azarmi, P. Angin, "End-to-End Service Oriented Architectures (SOA) Security Project," Purdue University Final Technical Report No. AFRL-RI-RS-TR-2012-049, 2012.
- L. ben Othmane, P. Angin, H. Weffers, and B. Bhargava, "Extending the Agile Development Process to Develop Acceptably Secure Software," Computer Science Report No. 13-06, Eindhoven University of Technology, 2013.