Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
Send a Request
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
162 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
..
8
9
10
11
12
..
14
000000000000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Impacts of frequent itemset hiding algorithms on privacy preserving data mining
Impacts of frequent itemset hiding algorithms on privacy preserving data mining
by
Yıldız, Barış.
Access to Electronic Version
Format:
Manuscript
2.
Development of a static analysis tool to find securty vulnerabilities in java applications
Development of a static analysis tool to find securty vulnerabilities in java applications
by
Topuz, Bertan.
Access to Electronic Version.
Format:
Manuscript
3.
Modeling and verification of a stream authentication protocol using communicating sequential processes
Modeling and verification of a stream authentication protocol using communicating sequential processes
by
Özkan, Süleyman Murat.
Access to Electronic Version.
Format:
Manuscript
4.
Intrusion detection system alert correlation with operating system level logs
Intrusion detection system alert correlation with operating system level logs
by
Toprak, Mustafa.
Access to Electronic Version.
Format:
Manuscript
5.
Traffic generator for firewall testing
Traffic generator for firewall testing
by
Kaya, Özgür.
Access to Electronic Version.
Format:
Manuscript
6.
The development of a social network analysis software tool
The development of a social network analysis software tool
by
Soydan, Cansoy.
Access to Electronic Version.
Format:
Manuscript
7.
A detection and correction approach for overflow vulnerabilities in graphical user interfaces
A detection and correction approach for overflow vulnerabilities in graphical user interfaces
by
Müftüoğlu, Can Arda.
Access to Electronic Version.
Format:
Manuscript
8.
Mining XML documents with association rule algorithms
Mining XML documents with association rule algorithms
by
Gürel, Görkem.
Access to Electronic Version.
Format:
Manuscript
9.
The web-based application of key exchange protocols for digital and mobile signatures.
The web-based application of key exchange protocols for digital and mobile signatures.
by
Akalp, Evren.
Access to Electronic Version.
Format:
Manuscript
10.
Solving the course scheduling problem by constraint programming and simulated annealing
Solving the course scheduling problem by constraint programming and simulated annealing
by
Aycan, Esra.
Access to Electronic Version.
Format:
Manuscript
11.
Access monitoring system for distributed firewall policies
Access monitoring system for distributed firewall policies
by
Çakı, Oğuzhan.
Access to Electronic Version.
Format:
Manuscript
12.
Quality life cycle of object oriented software development in extreme programming
Quality life cycle of object oriented software development in extreme programming
by
Mutlu, Gökçe.
Access to Electronic Version.
Format:
Manuscript
Select All
1
..
8
9
10
11
12
..
14
162 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Author: İzmir Institute of Technology. Computer Engineering.
Author
Include
Exclude
Ayav, Tolga, thesis advisor.
(14)
Tekir, Selma, thesis advisor.
(12)
Tuğlular, Tuğkan, thesis advisor.
(11)
Aytaç, Sıtkı. Thesis advisor.
(10)
Baştanlar, Yalın, thesis advisor.
(8)
Özuysal, Mustafa, thesis advisor.
(7)
Ergenç, Belgin. Thesis advisor.
(6)
Tuğlular, Tuğkan. Thesis advisor.
(6)
Şahin, Serap, thesis advisor.
(6)
Ayav Tolga. Theis advisor.
(5)
Erdoğmuş, Nesli, thesis advisor.
(5)
Erten, Yusuf Murat, thesis advisor.
(5)
Koltuksuz, Ahmet. Thesis advisor.
(5)
Aytaç, Sıtkı Thesis advisor.
(4)
Belli, Fevzi, thesis advisor.
(4)
Püskülcü, Halis Thesis advisor.
(4)
Ayav, Tolga thesis advisor.
(3)
Koltuksuz, Ahmet Thesis advisor.
(3)
Püskülcü, Halis Thesis advisor.
(3)
Tuğlular, Tuğkan thesis advisor.
(3)
Tuğlular, Tuğkan Thesis advisor.
(3)
Öz, Işıl, thesis advisor.
(3)
Akgün, Mete, thesis advisor.
(2)
Aytaç, İsmail Sıtkı. Thesis advisor.
(2)
Baştanlar, Yalın thesis advisor.
(2)
Demirörs, Onur, thesis advisor.
(2)
Erdoğmuş, Nesli, thesis advisor.
(2)
Ergenç Bostanoğlu, Belgin, thesis advisor.
(2)
Koltuksuz, Ahmet. Theis advisor.
(2)
Orhan, Semih, author.
(2)
Püskülcü, Halis. Thesis advisor.
(2)
Tuğlular, Tuğkan Thesis advisor
(2)
Uzyıldırım, Furkan Eren, author.
(2)
Abdella, Juhar Ahmed, author.
(1)
Abdennebi, Anes, author.
(1)
Abuzayed, Nourhan N.I., author.
(1)
Acar, Ali, author.
(1)
Ahmed, Rowanda Daoud, author.
(1)
Aka, Hüseyin Cüneyt.
(1)
Akalp, Evren.
(1)
Akdeniz, Eyüp Kaan, author.
(1)
Akkaya, Güliz, author.
(1)
Alkım, Erdem, thesis advisor.
(1)
Altıntaş, Aybike Güzel, author.
(1)
Arpaçay Tapucu, Dilek.
(1)
Arıkan, İbrahim, author.
(1)
Asadzade, Asad, author.
(1)
Aslan, Burak Galip.
(1)
Aslanoğlu, Rabia.
(1)
Assefa, Beakal Gizachew.
(1)
Atay, Abdullah Asil, author.
(1)
Atik, Ceren, author.
(1)
Atıcı, Beray.
(1)
Atıcı, İrem, author.
(1)
Ayav Tolga. theis advisor.
(1)
Ayav, Tolga, thesis advisor.
(1)
Ayav, Tolga.
(1)
Aycan, Esra.
(1)
Aytaç, Sıtkı Thesis advisor.
(1)
Aytaç, Sıtkı Thesis advisor
(1)
Balcı, Murat.
(1)
Barış İpek, author.
(1)
Barışık, Hakan.
(1)
Bazlamaçcı, Cüneyt Fehmi, thesis advisor.
(1)
Baştanlar, Yalın thesis advisor.
(1)
Baştanlar, Yalın, Thesis advisor.
(1)
Beyazıt, Mutlu.
(1)
Can, Özgür, author.
(1)
Caner, Serhat, author.
(1)
Cantürk, Sinem, author.
(1)
Dağdeviren, Orhan.
(1)
Doruk, Alpay.
(1)
Dönmez, Buğrahan, author.
(1)
Döşemeci, Mete Mertkan, author.
(1)
Ekin, Emine.
(1)
Eminağaoğlu, Mete.
(1)
Erciyeş, Kayhan Thesis advisor.
(1)
Erdoğan, Yunus.
(1)
Erman, Fatih, thesis advisor.
(1)
Erten, Yusuf Murat, thesis advisor.
(1)
Genç, Didem, author.
(1)
Gerçek, Gürcan.
(1)
Giray, Görkem, thesis advisor.
(1)
Gökçe, Tuncay Cemil.
(1)
Gözütok, Mehmet Emre.
(1)
Göçen, Alper, author.
(1)
Gülmez, Veli, author.
(1)
Günel, Can, author.
(1)
Güner, Dinçer, author.
(1)
Gürakın, Çağrı, author.
(1)
Gürel, Görkem.
(1)
Güventürk, Jale.
(1)
Güzel, Cumhur.
(1)
Haman, Bekir Ufuk, author.
(1)
Hekimgil, Hakan, author.
(1)
Hendrickson, Selim L.Y.
(1)
Kalecik, Mert, author.
(1)
Kaptan, Melike, author.
(1)
Karagüler, Caner, author.
(1)
Karaimer, Hakkı Can, author.
(1)
Karakış, Emre, author.
(1)
Karataş, Arzum, author.
(1)
Karaçay, Mustafa, author.
(1)
Kavzak Ufuktepe, Deniz, author.
(1)
Kaya, Ercüment, author.
(1)
Kaya, Özgür.
(1)
Kayayurt, Barış.
(1)
Keklik, Onur, author.
(1)
Khalilov, Abbas, author.
(1)
Koltuksuz Ahmet Hasan Thesis advisor.
(1)
Koltuksuz, Ahmet H. Thesis advisor.
(1)
Koltuksuz, Ahmet H. Thesis advisor.
(1)
Koltuksuz, Ahmet Hasan. Theis advisor.
(1)
Koltuksuz, Ahmet Hasan. Thesis advisor.
(1)
Kul, Aslı, author.
(1)
Kumova, Bora İsmail thesis advisor.
(1)
Kumova, İ. Bora. Theis advisor.
(1)
Kurtel, Kaan, thesis advisor.
(1)
Köksal, Ali, author.
(1)
Külahçıoğlu, Burcu.
(1)
Kılınç, Hacı Hakan.
(1)
Kılınç, Vahdettin Onur, author.
(1)
Kızılkaya, Melih, author.
(1)
Leblebici, Onur Yusuf, author.
(1)
Mersin, Ali.
(1)
Mezgil, Bahadır, author.
(1)
Mutaf, Pars.
(1)
Mutlu, Gökçe.
(1)
Müftüoğlu, Can Arda.
(1)
Nalçakan, Yağız, author.
(1)
Nurel, Mehmet Ali.
(1)
Okyay, Mehmet Onur.
(1)
Oğul, İskender Ülgen, author.
(1)
Oğuz, Damla.
(1)
Oğuzer, Lütfü Melih Buğra, author.
(1)
Parkın, Kübra, author.
(1)
Polatbilek, Ozan, author.
(1)
Saydam, Berkay, author.
(1)
Sayin, Burcu, author.
(1)
Sevgili Ergüven, Özge, author.
(1)
Sezerer, Erhan, author.
(1)
Sezgin, Yağızcan, author.
(1)
Shariff, Karunda.
(1)
Sokat, Barış, author.
(1)
Soydan, Cansoy.
(1)
Soygazi, Fatih, thesis advisor.
(1)
Soygazi, Üyesi Fatih, thesis advisor.
(1)
Sönmeztürk, Osman, author.
(1)
Sülün, Erhan.
(1)
Tahaoğlu, Osman Okyar.
(1)
Takan, Savaş, author.
(1)
Takan, Savaş.
(1)
Tarkan, Yalçın, author.
(1)
Taş, Levent.
(1)
Tekbacak, Fatih.
(1)
Tekeli, Ulaş, author.
(1)
Tekin, Leyla, author.
(1)
Tekir, Selma thesis advisor.
(1)
Tekir, Selma, thesis advisor.
(1)
Tekir, Selma.
(1)
Tekir, Selma. Thesis advisor.
(1)
Temizkan, Onur, author.
(1)
Tepeli, Murat.
(1)
Thera, David, author.
(1)
Titiz, Dilek.
(1)
Tok, Metin.
(1)
Toprak, Mustafa, author.
(1)
Toprak, Mustafa.
(1)
Topuz, Bertan.
(1)
Topçu, Burak, author.
(1)
Tos, Uras.
(1)
Turanlı, Dehan.
(1)
Tutum, Mustafa Özgür.
(1)
Tuğlular, Tuğkan thesis advisor.
(1)
Tuğlular, Tuğkan. Thesis advisor
(1)
Türkmen, Fatih, author.
(1)
Ufuktepe, Ekincan, author.
(1)
Ufuktepe, Ekincan, author.
(1)
Uludağ ,Mehmet.
(1)
Uslu, Sevgi.
(1)
Uysal, Ertan, author.
(1)
Uzun Yenigün, Bengisu, author.
(1)
Vatansever, Mustafa.
(1)
Yalçın, Ali Görkem, author.
(1)
Yaman, Okan, author.
(1)
Yaraş, Neriman, author.
(1)
Yaşar, Damla, author.
(1)
Yiğitbaşı, Boğaçhan, author.
(1)
Yörük, Burak, author.
(1)
Yücel, Çağan Selçuk.
(1)
Yüksel, Ulaş.
(1)
Yıldız, Barış.
(1)
Zarechnew, Mikhail, author.
(1)
Çakı, Oğuzhan.
(1)
Çakır, Hüseyin.
(1)
Çelikdemir, Özgür.
(1)
Çetin, Füsun.
(1)
Çetin, Şevket, author.
(1)
Çiftçi, Okan, author.
(1)
Çine, Ersin, author.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Thesis
(162)
Supplementary CD-ROM
(146)
Language
Include
Exclude
English
(159)
Publication Date
Include
Exclude
This graph shows the distribution of publication dates for use with a date range slider. Switch to Years view for a more detailed breakdown of search results by year.
From Publication Year
-
To Publication Year
2022
(18)
2019
(17)
2020
(16)
2023
(11)
2018
(9)
2010
(8)
2006
(7)
2008
(7)
2012
(7)
2001
(6)
2021
(6)
1999
(5)
2004
(5)
2002
(4)
2007
(4)
2009
(4)
2013
(4)
2015
(4)
2016
(4)
2017
(4)
1997
(3)
2003
(3)
2014
(2)
1998
(1)
2000
(1)
2005
(1)
2024
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Neural networks (Computer science).
(10)
Machine learning.
(9)
Computer networks -- Security measures.
(7)
Neural networks (Computer science)
(7)
Computer algorithms.
(6)
Computer vision.
(6)
Computer networks -- Security measures -- Software.
(5)
Data mining.
(5)
Firewalls(Computer security)
(5)
Artificial intelligence.
(4)
Computer security.
(4)
Computer software -- Testing.
(4)
Computer vision
(4)
Cryptography.
(4)
Data mining
(4)
Natural language processing (Computer science)
(4)
Pattern recognition systems.
(4)
Algorithms.
(3)
Blockchains (Databases)
(3)
Computer security
(3)
Computer software.
(3)
Image processing.
(3)
Internet of things.
(3)
Machine learning
(3)
Natural language processing (Computer science).
(3)
Real-time data processing.
(3)
Artificial intelligence
(2)
Association rule mining.
(2)
Cluster analysis.
(2)
Computer network protocols.
(2)
Computer networks -- Security measures
(2)
Data minning.
(2)
Deep learning (Machine learning)
(2)
Fingerprints.
(2)
Graphics processing units
(2)
Image processing
(2)
Image processing -- Digital techniques
(2)
Java(Computer program language)
(2)
JavaScript (Computer program language).
(2)
Lattice theory.
(2)
Logistics -- Computer programs.
(2)
Mobile communication systems -- Security measures.
(2)
Operating systems (Computers)
(2)
Privacy.
(2)
Programmable controllers.
(2)
Real-time control.
(2)
Semantic computing.
(2)
Social networks.
(2)
Vehicle detectors.
(2)
XML(Document markup language)
(2)
Ad hoc networks (Computer networks)
(1)
Adaptive control systems.
(1)
Agricultural innovations
(1)
Agriculture -- Technology transfer
(1)
Algorithms
(1)
Artifical intelligence.
(1)
Artificial Intelligence.
(1)
Artificial intelligence -- Agricultural applications
(1)
Artificial intelligence -- Social aspects.
(1)
Authentication
(1)
Automatic control.
(1)
Bayesian statistical decision theory.
(1)
Belt conveyors.
(1)
Big data -- Security measures.
(1)
Biometric identification
(1)
Biometric identification.
(1)
Blockchains (Databases) -- Industrial applications.
(1)
Blockchains (Databases).
(1)
Business
(1)
CSP(Computer program language)
(1)
CUDA (Computer architecture)
(1)
Camera -- Calibration.
(1)
Cameras -- Calibration.
(1)
Cell phone systems.
(1)
Cloud computing.
(1)
Cluster algebras.
(1)
Cluster analysis -- Computer programs
(1)
Computer graphics
(1)
Computer logic.
(1)
Computer networks -- Security measures -- Testing.
(1)
Computer networks--Security measures
(1)
Computer programs -- Testing
(1)
Computer programs.
(1)
Computer security -- Computer programs.
(1)
Computer software -- Development -- Graphic methods.
(1)
Computer software -- Development.
(1)
Computer software -- Evaluation.
(1)
Computer software -- Reliability.
(1)
Computers -- Access control
(1)
Computers -- Access control -- Passwords
(1)
Computers -- Access control.
(1)
Computers -- Reliability.
(1)
Computers securiyt.
(1)
Constraint programming(Computer science)
(1)
Container terminal.
(1)
Context-aware computing
(1)
Context-aware computing.
(1)
Counterfactuals (Logic)
(1)
Cryptography
(1)
Cryptography -- Mathematics
(1)
Cryptography -- Standards
(1)
Cryptography -- Turkey
(1)
DOS device drivers(Computer programs)
(1)
Data encryption (Computer science)
(1)
Data encryption (Computer science) -- Mathematics.
(1)
Data encryption (Computer science).
(1)
Data encryption(Computer science)
(1)
Data encryption.
(1)
Data processing.
(1)
Database design
(1)
Database management.
(1)
Database security.
(1)
Debugging in computer science
(1)
Diagnostic imaging.
(1)
Digital images.
(1)
Digital signatures.
(1)
Distance education -- Computer-assisted instruction
(1)
Distance education -- Turkey
(1)
Distance education -- Turkey.
(1)
Driver assistance systems.
(1)
Education -- Computer network resources.
(1)
Electronic data processing.
(1)
Electronic mail systems -- Security measures
(1)
Electronic traffic controls.
(1)
Embedded Internet devices.
(1)
Embedded computer systems
(1)
Embedded computer systems.
(1)
Extreme programming.
(1)
Fingerprints -- Identification
(1)
Fingerprints -- Identification -- Automation -- Evaluation.
(1)
Fingerprints -- Identification.
(1)
Firewall(Computer security)
(1)
Firewalls (Computer security)
(1)
Firewalls (Computer security).
(1)
Fourier analysis.
(1)
Fuzzy algorithms.
(1)
Fuzzy expert systems.
(1)
Fuzzy mathematics.
(1)
Genetic algorithms.
(1)
Geometry, Projective
(1)
Graph theory
(1)
Graphical user interfaces(Computer systems)
(1)
Graphics processing units.
(1)
Heuristiq programming.
(1)
High resolution imaging.
(1)
Homomorphisms (Mathematics)
(1)
Image Processing, Computer-Assisted.
(1)
Image analysis.
(1)
Image processing -- Digital techniques.
(1)
Image registration.
(1)
Image segmentation.
(1)
Imaging systems.
(1)
Information retrieval
(1)
Information storage and retrieval systems.
(1)
Infrared spectroscopy.
(1)
Intelligent agents (Computer software)
(1)
Internet of things
(1)
Internet of things -- Safety measures.
(1)
Internet service providers -- Computer programs.
(1)
Kalman filtering.
(1)
Learning classifier systems.
(1)
Linear programming.
(1)
Logic, Symbolic and mathematical.
(1)
Machine intelligence
(1)
Machine theory.
(1)
Management information systems
(1)
Management information systems.
(1)
Markov processes.
(1)
Mass spectrometry -- Data processing.
(1)
Mitochondrial DNA
(1)
Mobile communication systems
(1)
Mobile communication systems -- Access control.
(1)
Mobile computing -- Security measures
(1)
Multimedia systems.
(1)
Mutation testing of computer programs.
(1)
Number theory -- Data processing.
(1)
Numbers, Prime.
(1)
Online social networks -- Security measures.
(1)
Open source software
(1)
Operating systems (Computers).
(1)
Operating systems(Computers)
(1)
Personal communication service systems
(1)
Petri nets
(1)
Programmable logic devices -- Design.
(1)
Programming (Mathematics)
(1)
Programming (Mathematics).
(1)
Proteomics -- Data processing.
(1)
Proteomics -- Statistical methods
(1)
Public key infrastructure (Computer security).
(1)
Query languages (Computer science).
(1)
Question-answering systems.
(1)
Radiation -- Dosage.
(1)
Radiation dosimetry -- Computer programs.
(1)
Radiography, Medical.
(1)
Real-time programming
(1)
Regression analysis.
(1)
Relational databases.
(1)
Robot vision.
(1)
Schedules, School.
(1)
Scholary web sites.
(1)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
Thesis Collection
(162)
Library
Include
Exclude
IYTE Library
(162)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}