Showing results 1 to 20 of 98
next >
Issue Date | Title | Author(s) |
2009 | The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing | Tuğlular, Tuğkan ; Kaya, Özgür; Müftüoğlu, Can Arda; Belli, Fevzi |
2008 | Access monitoring system for distributed firewall policies | Çakı, Oğuzhan |
2017 | Advances in model-based testing of graphical user interfaces | Belli, Fevzi ; Beyazıt, Mutlu; Budnik, Christof J.; Tuğlular, Tuğkan |
2004 | Analysis of intrusion prevention methods | Semerci, Hakan |
2009 | Anomaly detection using network traffic characterization | Yarımtepe, Oğuz |
Dec-2020 | Application of graph neural networks on software modeling | Leblebici, Onur Yusuf |
2021 | Application of human-robot interaction features to design and purchase processes of home robots | Yapıcı, Nur Beril; Tuğlular, Tuğkan ; Başoğlu, Ahmet Nuri |
2023 | Application of the law of minimum and dissimilarity analysis to regression test case prioritization | Ufuktepe, Ekincan ; Tuğlular, Tuğkan |
2009 | An architecture for verification of access control policies with multi agent system ontologies | Tekbacak, Fatih; Tuğlular, Tuğkan ; Dikenelli, Oğuz |
2022 | Assessment of human-robot interaction between householders and robotic vacuum cleaners | Yapıcı, Nur Beril; Tuğlular, Tuğkan ; Başoğlu, Ahmet Nuri |
2008 | Automatic enforcement of location aware user based network access control policies | Tuğlular, Tuğkan |
Jul-2018 | Automatic question generation using natural language processing techniques | Keklik, Onur |
Aug-2016 | Automation architecture for Bayesian Network based test case prioritization and execution | Ufuktepe, Ekincan ; Tuğlular, Tuğkan |
2017 | Bağlamsal doğrulama için bir yazılım tasarım şablonu | Tuğlular, Tuğkan |
2020 | Belge sorumluluk iş-birliği modelleme yöntemi ile otomatik kod üretimi | Tuğlular, Tuğkan ; Leblebici, Onur |
21-Jun-2021 | Bir yazılımın dayanıklılığını ölçmeye yönelik bir yöntem | Tuğlular, Tuğkan ; Ufuktepe, Ekincan |
2011 | Campus network topology discovery and distributed firewall policy generation | Çalışkan, Ezgi |
2021 | Code change sniffer: Predicting future code changes with Markov chain | Ufuktepe, Ekincan ; Tuğlular, Tuğkan |
Jun-2015 | Collection and classification of JavaScript libraries included in website | Atıcı, İrem |
2002 | Comparison of recovery requirements with investigation requirements for intrusion management systems | Arpaçay Tapucu, Dilek |