Search Results for Tuğlular, Tuğkan,SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dTu$0025C4$00259Flular$00252C$002bTu$0025C4$00259Fkan$00252C$0026ps$003d300?2024-06-20T03:33:37ZPolicy anomaly reporting for distributed firewallsent://SD_ILS/0/SD_ILS:163282024-06-20T03:33:37Z2024-06-20T03:33:37Zby Çetin, Füsun.<br/><a href="http://hdl.handle.net/11147/3197">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Automatic question generation using natural language processing techniquesent://SD_ILS/0/SD_ILS:20755792024-06-20T03:33:37Z2024-06-20T03:33:37Zby Keklik, Onur, author.<br/><a href="http://hdl.handle.net/11147/6938">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Developing a security mechanism for software agentsent://SD_ILS/0/SD_ILS:188542024-06-20T03:33:37Z2024-06-20T03:33:37Zby Tekbacak, Fatih.<br/><a href="http://hdl.handle.net/11147/3438">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Tag based storage and retrieval system for organization related newsent://SD_ILS/0/SD_ILS:21339392024-06-20T03:33:37Z2024-06-20T03:33:37Zby Parkın, Kübra, author.<br/><a href="https://hdl.handle.net/11147/7391">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Traffic generator for firewall testingent://SD_ILS/0/SD_ILS:412352024-06-20T03:33:37Z2024-06-20T03:33:37Zby Kaya, Özgür.<br/><a href="http://hdl.handle.net/11147/3631">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Web Services Security: A Proposed Architecture For Interdomain Trust Relationshipent://SD_ILS/0/SD_ILS:254022024-06-20T03:33:37Z2024-06-20T03:33:37Zby Hendrickson, Selim L.Y.<br/><a href="http://hdl.handle.net/11147/3469">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Test driven software developmentent://SD_ILS/0/SD_ILS:168132024-06-20T03:33:37Z2024-06-20T03:33:37Zby Algan, Fatih.<br/><a href="http://hdl.handle.net/11147/3291">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Comparison of recovery requirements with investigation requirements for intrusion management systemsent://SD_ILS/0/SD_ILS:252472024-06-20T03:33:37Z2024-06-20T03:33:37Zby Arpaçay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Development of a Quality Assurance Prototype for Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:187282024-06-20T03:33:37Z2024-06-20T03:33:37Zby Yüksel, Ulaş.<br/><a href="http://hdl.handle.net/11147/3428">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Domain-specific modeling based feature-oriented automatic test generation methodology for software product linesent://SD_ILS/0/SD_ILS:21339942024-06-20T03:33:37Z2024-06-20T03:33:37Zby Şensülün, Sercan, author.<br/><a href="https://hdl.handle.net/11147/7347">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Tag-based dynamic ranking system for organization related newsent://SD_ILS/0/SD_ILS:20444002024-06-20T03:33:37Z2024-06-20T03:33:37Zby Özkan, Mustafa Tunahan, author.<br/><a href="http://hdl.handle.net/11147/6908">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>A detection and correction approach for overflow vulnerabilities in graphical user interfacesent://SD_ILS/0/SD_ILS:1006572024-06-20T03:33:37Z2024-06-20T03:33:37Zby Müftüoğlu, Can Arda.<br/><a href="http://hdl.handle.net/11147/3013">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Access monitoring system for distributed firewall policiesent://SD_ILS/0/SD_ILS:857052024-06-20T03:33:37Z2024-06-20T03:33:37Zby Çakı, Oğuzhan.<br/><a href="http://hdl.handle.net/11147/3953">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Container damage detection and classification using container imagesent://SD_ILS/0/SD_ILS:21340502024-06-20T03:33:37Z2024-06-20T03:33:37Zby İmamoğlu, Zeynep, author.<br/><a href="https://hdl.handle.net/11147/7497">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Analysis of intrusion prevention methodsent://SD_ILS/0/SD_ILS:474612024-06-20T03:33:37Z2024-06-20T03:33:37Zby Semerci, Hakan.<br/><a href="http://hdl.handle.net/11147/3695">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Development of co-evolution tracker tool for nsoftware with acceptance criteriaent://SD_ILS/0/SD_ILS:22802612024-06-20T03:33:37Z2024-06-20T03:33:37Zby Yalçın, Ali Görkem, author.<br/><a href="https://hdl.handle.net/11147/12714">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Development of a distributed firewall administration toolent://SD_ILS/0/SD_ILS:174182024-06-20T03:33:37Z2024-06-20T03:33:37Zby Erdoğan, Yunus.<br/><a href="http://hdl.handle.net/11147/3360">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Firewall monitoring using intrusion detection systemsent://SD_ILS/0/SD_ILS:168172024-06-20T03:33:37Z2024-06-20T03:33:37Zby Asarcıklı, Şükran.<br/><a href="http://hdl.handle.net/11147/3295">Access to Electronic Version</a><br/>Format: Manuscript<br/>A model-based test generation approach for agile software product linesent://SD_ILS/0/SD_ILS:21464212024-06-20T03:33:37Z2024-06-20T03:33:37Zby Öztürk, Dilek, author.<br/><a href="https://hdl.handle.net/11147/10818">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Test case prioritization for regression testing using change impact analysisent://SD_ILS/0/SD_ILS:21338892024-06-20T03:33:37Z2024-06-20T03:33:37Zby Ufuktepe, Ekincan, author.<br/><a href="https://hdl.handle.net/11147/7432">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Collection and classification of javascript libraries included in websiteent://SD_ILS/0/SD_ILS:5178872024-06-20T03:33:37Z2024-06-20T03:33:37Zby Atıcı, İrem, author.<br/><a href="http://hdl.handle.net/11147/4331">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Measurement of javascript applications' readiness to untrusted data using bayesian networksent://SD_ILS/0/SD_ILS:4683082024-06-20T03:33:37Z2024-06-20T03:33:37Zby Ufuktepe, Ekincan, author.<br/><a href="http://hdl.handle.net/11147/4249">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Campus network topology discovery and distributed firewall policy generationent://SD_ILS/0/SD_ILS:1293602024-06-20T03:33:37Z2024-06-20T03:33:37Zby Çalışkan, Ezgi.<br/><a href="http://hdl.handle.net/11147/3102">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Anomaly detection using network traffic characterizationent://SD_ILS/0/SD_ILS:250272024-06-20T03:33:37Z2024-06-20T03:33:37Zby Yarımtepe, Oğuz.<br/><a href="http://hdl.handle.net/11147/3459">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Development of a static analysis tool to find securty vulnerabilities in java applicationsent://SD_ILS/0/SD_ILS:1063912024-06-20T03:33:37Z2024-06-20T03:33:37Zby Topuz, Bertan.<br/><a href="http://hdl.handle.net/11147/3039">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Development of a web services security archhitecture based on net frameworkent://SD_ILS/0/SD_ILS:462282024-06-20T03:33:37Z2024-06-20T03:33:37Zby Bacı, Recep.<br/><a href="http://hdl.handle.net/11147/3688">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Improving misuse detection with neural networksent://SD_ILS/0/SD_ILS:167872024-06-20T03:33:37Z2024-06-20T03:33:37Zby Demiray, Sadettin.<br/><a href="http://hdl.handle.net/11147/3284">Access to Electronic Version</a><br/>Format: Manuscript<br/>End-to-end security for mobile devicesent://SD_ILS/0/SD_ILS:177582024-06-20T03:33:37Z2024-06-20T03:33:37Zby Kayayurt, Barış.<br/><a href="http://hdl.handle.net/11147/3380">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systemsent://SD_ILS/0/SD_ILS:482432024-06-20T03:33:37Z2024-06-20T03:33:37Zby Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Application of graph neural networks on software modelingent://SD_ILS/0/SD_ILS:22042702024-06-20T03:33:37Z2024-06-20T03:33:37Zby Leblebici, Onur Yusuf, author.<br/><a href="https://hdl.handle.net/11147/11100">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Design and implementation of a domain specific language for event sequence graphsent://SD_ILS/0/SD_ILS:22622372024-06-20T03:33:37Z2024-06-20T03:33:37Zby Kalecik, Mert, author.<br/><a href="https://hdl.handle.net/11147/12466">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Wirelless mesh network throughput analysis using petri netsent://SD_ILS/0/SD_ILS:22622772024-06-20T03:33:37Z2024-06-20T03:33:37Zby Oğuzer, Lütfü Melih Buğra, author.<br/><a href="https://hdl.handle.net/11147/12463">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Development of a machine learning platform for analysis of mitochondrial features in live-cell imagesent://SD_ILS/0/SD_ILS:23357702024-06-20T03:33:37Z2024-06-20T03:33:37Zby Tarkan, Yalçın, author.<br/><a href="https://hdl.handle.net/11147/13251">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Mutation analysis of specification-based contracts in software testingent://SD_ILS/0/SD_ILS:22048992024-06-20T03:33:37Z2024-06-20T03:33:37Zby Khalilov, Abbas, author.<br/><a href="https://hdl.handle.net/11147/11152">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>The effect of human-robot interaction on design and use process of home robotsent://SD_ILS/0/SD_ILS:22622832024-06-20T03:33:37Z2024-06-20T03:33:37Zby Yapıcı, Nur Beril, author.<br/><a href="https://hdl.handle.net/11147/12467">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>