default search action
Bharat K. Bhargava
- > Home > Persons > Bharat K. Bhargava
Publications
- 2024
- [j134]Ganapathy Mani, Myeongsu Kim, Bharat K. Bhargava, Pelin Angin, Ayça Deniz, Vikram Pasumarti:
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking. IEEE Trans. Dependable Secur. Comput. 21(4): 2461-2477 (2024) - 2023
- [j126]Ganapathy Mani, Marina Haliem, Bharat K. Bhargava, Indu Manickam, Kevin Kochpatcharin, Myeongsu Kim, Eric D. Vugrin, Weichao Wang, Chris Jenkins, Pelin Angin, Meng Yu:
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense. IEEE Trans. Dependable Secur. Comput. 20(6): 4853-4867 (2023) - 2022
- [j120]Pradeep Kumar Singh, Bharat K. Bhargava, Wei-Chiang Hong, Pelin Angin:
1174: futuristic trends and innovations in multimedia systems using big data, IoT and cloud technologies (FTIMS). Multim. Tools Appl. 81(24): 34439-34445 (2022) - 2021
- [c164]Bharat K. Bhargava, Rohit Ranchal, Pelin Angin:
Privacy-Preserving Data Sharing and Adaptable Service Compositions in Mission-Critical Clouds. ISIC 2021: 60-66 - 2019
- [j103]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:
Big Data Analytics for Cyber Security. Secur. Commun. Networks 2019: 4109836:1-4109836:2 (2019) - [j101]Rohit Ranchal, Bharat K. Bhargava, Pelin Angin, Lotfi Ben Othmane:
EPICS: A Framework for Enforcing Security Policies in Composite Web Services. IEEE Trans. Serv. Comput. 12(3): 415-428 (2019) - [c152]Servio Palacios, K. M. A. Solaiman, Pelin Angin, Alina Nesen, Bharat K. Bhargava, Zachary Collins, Aaron Sipser, Michael Stonebraker, James MacDonald:
WIP - SKOD: A Framework for Situational Knowledge on Demand. Poly/DMAH@VLDB 2019: 154-166 - 2018
- [j100]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:
A self-protecting agents based model for high-performance mobile-cloud computing. Comput. Secur. 77: 380-396 (2018) - [c150]Ganapathy Mani, Bharat K. Bhargava, Pelin Angin, Miguel Villarreal-Vasquez, Denis A. Ulybyshev, Jason Kobes:
Machine Learning Models to Enhance the Science of Cognitive Autonomy. AIKE 2018: 46-53 - 2017
- [c142]Ruchith Fernando, Rohit Ranchal, Bharat K. Bhargava, Pelin Angin:
A Monitoring Approach for Policy Enforcement in Cloud Services. CLOUD 2017: 600-607 - [c141]Miguel Villarreal-Vasquez, Bharat K. Bhargava, Pelin Angin, Noor Ahmed, Daniel Goodwin, Kory Brin, Jason Kobes:
An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems. CLOUD 2017: 723-726 - [c138]Miguel Villarreal-Vasquez, Bharat K. Bhargava, Pelin Angin:
Adaptable Safety and Security in V2X Systems. ICIOT 2017: 17-24 - [c137]Rohit Ranchal, Sidak Pal Singh, Pelin Angin, Ajay Mohindra, Hui Lei, Bharat K. Bhargava:
RaaS and Hierarchical Aggregation Revisited. ICWS 2017: 41-48 - 2016
- [j93]Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin:
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(1): 79-96 (2016) - [c132]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:
Tamper-resistant autonomous agents-based mobile-cloud computing. NOMS 2016: 843-847 - 2015
- [j89]Yuhui Zhong, Bharat K. Bhargava, Yi Lu, Pelin Angin:
A Computational Dynamic Trust Model for User Authorization. IEEE Trans. Dependable Secur. Comput. 12(1): 1-15 (2015) - [c131]Pelin Angin, Bharat K. Bhargava, Zhongjun Jin:
A Self-Cloning Agents Based Model for High-Performance Mobile-Cloud Computing. CLOUD 2015: 301-308 - [c128]Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Sunil Lingayat:
A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing. SRDS Workshop 2015: 31-35 - [c126]Leszek T. Lilien, Lotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava, Raed M. Salih, Andrew DeCarlo:
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks. SRDS Workshop 2015: 57-61 - 2014
- [j82]Leszek Lilien, Lotfi Ben Othmane, Pelin Angin, Andrew DeCarlo, Raed M. Salih, Bharat K. Bhargava:
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks. J. Netw. Comput. Appl. 38: 3-15 (2014) - [j81]Lotfi Ben Othmane, Pelin Angin, Harold Weffers, Bharat K. Bhargava:
Extending the Agile Development Process to Develop Acceptably Secure Software. IEEE Trans. Dependable Secur. Comput. 11(6): 497-509 (2014) - [c125]Lotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava:
Using Assurance Cases to Develop Iteratively Security Features Using Scrum. ARES 2014: 490-497 - 2013
- [j80]Lotfi Ben Othmane, Harold Weffers, Pelin Angin, Bharat K. Bhargava:
A time-evolution model for the privacy degree of information disseminated in online social networks. Int. J. Commun. Networks Distributed Syst. 11(4): 412-430 (2013) - [j79]Pelin Angin, Bharat K. Bhargava:
An Agent-based Optimization Framework for Mobile-Cloud Computing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 1-17 (2013) - [c121]Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad:
A Case for Societal Digital Security Culture. SEC 2013: 391-404 - 2012
- [j73]Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Ranjitkumar Sivakumar, Asher Sinclair, Mark Linderman:
A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs. Int. J. Next Gener. Comput. 3(1) (2012) - [c117]Mehdi Azarmi, Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Norman Ahmed, Asher Sinclair, Mark Linderman, Lotfi Ben Othmane:
An End-to-End Security Auditing Approach for Service Oriented Architectures. SRDS 2012: 279-284 - 2010
- [c113]Pelin Angin, Bharat K. Bhargava, Sumi Helal:
A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation. Mobile Data Management 2010: 396-401 - [c112]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, Lotfi Ben Othmane, Leszek Lilien:
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing. SRDS 2010: 177-183
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-11 00:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint