Browsing by Author Tuğlular, Tuğkan

Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 72  next >
Issue DateTitleAuthor(s)
2009The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testingTuğlular, Tuğkan ; Kaya, Özgür; Müftüoğlu, Can Arda; Belli, Fevzi
2008Access monitoring system for distributed firewall policiesÇakı, Oğuzhan
2017Advances in model-based testing of graphical user interfacesBelli, Fevzi; Beyazıt, Mutlu; Budnik, Christof J.; Tuğlular, Tuğkan 
2004Analysis of intrusion prevention methodsSemerci, Hakan
2009Anomaly detection using network traffic characterizationYarımtepe, Oğuz
2009An architecture for verification of access control policies with multi agent system ontologiesTekbacak, Fatih; Tuğlular, Tuğkan ; Dikenelli, Oğuz
2020Automatic code generation with document responsibility collaboration modelling methodTuğlular, Tuğkan ; Leblebici, Onur
2008Automatic enforcement of location aware user based network access control policiesTuğlular, Tuğkan 
Jul-2018Automatic question generation using natural language processing techniquesKeklik, Onur
Aug-2016Automation architecture for Bayesian Network based test case prioritization and executionUfuktepe, Ekincan; Tuğlular, Tuğkan 
2017Bağlamsal doğrulama için bir yazılım tasarım şablonuTuğlular, Tuğkan 
21-Jun-2021Bir yazılımın dayanıklılığını ölçmeye yönelik bir yöntemTuğlular, Tuğkan ; Ufuktepe, Ekincan
2011Campus network topology discovery and distributed firewall policy generationÇalışkan, Ezgi
Jun-2015Collection and classification of JavaScript libraries included in websiteAtıcı, İrem
2002Comparison of recovery requirements with investigation requirements for intrusion management systemsArpaçay Tapucu, Dilek
Aug-2016COMPSAC 2016 Symposium on technologies and applications of the internet (TAIN): Message from the program co-chairsTuğlular, Tuğkan ; Cai, Ying; Dustdar, Schahram; Yamazaki, Katsuyuki
Jun-2019Container damage detection and classification using container imagesİmamoğlu, Zeynep
2009A detection and correction approach for overflow vulnerabilities in graphical user interfacesMüftüoğlu, Can Arda
2006Developing a security mechanism for software agentsTekbacak, Fatih
2008Development of a distributed firewall administration toolErdoğan, Yunus