Search Results for Tuğlular, Tuğkan, - Narrowed by: Tez SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dTu$0025C4$00259Flular$00252C$002bTu$0025C4$00259Fkan$00252C$0026qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253ATEZ$002509Tez$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300? 2024-05-30T23:09:57Z Policy anomaly reporting for distributed firewalls ent://SD_ILS/0/SD_ILS:16328 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;&Ccedil;etin, F&uuml;sun.<br/><a href="http://hdl.handle.net/11147/3197">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Automatic question generation using natural language processing techniques ent://SD_ILS/0/SD_ILS:2075579 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Keklik, Onur, author.<br/><a href="http://hdl.handle.net/11147/6938">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Developing a security mechanism for software agents ent://SD_ILS/0/SD_ILS:18854 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Tekbacak, Fatih.<br/><a href="http://hdl.handle.net/11147/3438">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Tag based storage and retrieval system for organization related news ent://SD_ILS/0/SD_ILS:2133939 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Parkın, K&uuml;bra, author.<br/><a href="https://hdl.handle.net/11147/7391">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Traffic generator for firewall testing ent://SD_ILS/0/SD_ILS:41235 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Kaya, &Ouml;zg&uuml;r.<br/><a href="http://hdl.handle.net/11147/3631">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Web Services Security: A Proposed Architecture For Interdomain Trust Relationship ent://SD_ILS/0/SD_ILS:25402 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Hendrickson, Selim L.Y.<br/><a href="http://hdl.handle.net/11147/3469">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Test driven software development ent://SD_ILS/0/SD_ILS:16813 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Algan, Fatih.<br/><a href="http://hdl.handle.net/11147/3291">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Comparison of recovery requirements with investigation requirements for intrusion management systems ent://SD_ILS/0/SD_ILS:25247 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Arpa&ccedil;ay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Development of a Quality Assurance Prototype for Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:18728 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Y&uuml;ksel, Ulaş.<br/><a href="http://hdl.handle.net/11147/3428">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Domain-specific modeling based feature-oriented automatic test generation methodology for software product lines ent://SD_ILS/0/SD_ILS:2133994 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Şens&uuml;l&uuml;n, Sercan, author.<br/><a href="https://hdl.handle.net/11147/7347">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Tag-based dynamic ranking system for organization related news ent://SD_ILS/0/SD_ILS:2044400 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;&Ouml;zkan, Mustafa Tunahan, author.<br/><a href="http://hdl.handle.net/11147/6908">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> A detection and correction approach for overflow vulnerabilities in graphical user interfaces ent://SD_ILS/0/SD_ILS:100657 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;M&uuml;ft&uuml;oğlu, Can Arda.<br/><a href="http://hdl.handle.net/11147/3013">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Access monitoring system for distributed firewall policies ent://SD_ILS/0/SD_ILS:85705 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;&Ccedil;akı, Oğuzhan.<br/><a href="http://hdl.handle.net/11147/3953">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Container damage detection and classification using container images ent://SD_ILS/0/SD_ILS:2134050 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;İmamoğlu, Zeynep, author.<br/><a href="https://hdl.handle.net/11147/7497">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Analysis of intrusion prevention methods ent://SD_ILS/0/SD_ILS:47461 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Semerci, Hakan.<br/><a href="http://hdl.handle.net/11147/3695">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Development of co-evolution tracker tool for nsoftware with acceptance criteria ent://SD_ILS/0/SD_ILS:2280261 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Yal&ccedil;ın, Ali G&ouml;rkem, author.<br/><a href="https://hdl.handle.net/11147/12714">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Development of a distributed firewall administration tool ent://SD_ILS/0/SD_ILS:17418 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Erdoğan, Yunus.<br/><a href="http://hdl.handle.net/11147/3360">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Firewall monitoring using intrusion detection systems ent://SD_ILS/0/SD_ILS:16817 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Asarcıklı, Ş&uuml;kran.<br/><a href="http://hdl.handle.net/11147/3295">Access to Electronic Version</a><br/>Format:&#160;El Yazması<br/> A model-based test generation approach for agile software product lines ent://SD_ILS/0/SD_ILS:2146421 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;&Ouml;zt&uuml;rk, Dilek, author.<br/><a href="https://hdl.handle.net/11147/10818">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Test case prioritization for regression testing using change impact analysis ent://SD_ILS/0/SD_ILS:2133889 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Ufuktepe, Ekincan, author.<br/><a href="https://hdl.handle.net/11147/7432">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Collection and classification of javascript libraries included in website ent://SD_ILS/0/SD_ILS:517887 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Atıcı, İrem, author.<br/><a href="http://hdl.handle.net/11147/4331">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Measurement of javascript applications' readiness to untrusted data using bayesian networks ent://SD_ILS/0/SD_ILS:468308 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Ufuktepe, Ekincan, author.<br/><a href="http://hdl.handle.net/11147/4249">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Campus network topology discovery and distributed firewall policy generation ent://SD_ILS/0/SD_ILS:129360 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;&Ccedil;alışkan, Ezgi.<br/><a href="http://hdl.handle.net/11147/3102">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Anomaly detection using network traffic characterization ent://SD_ILS/0/SD_ILS:25027 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Yarımtepe, Oğuz.<br/><a href="http://hdl.handle.net/11147/3459">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Development of a static analysis tool to find securty vulnerabilities in java applications ent://SD_ILS/0/SD_ILS:106391 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Topuz, Bertan.<br/><a href="http://hdl.handle.net/11147/3039">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Development of a web services security archhitecture based on net framework ent://SD_ILS/0/SD_ILS:46228 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Bacı, Recep.<br/><a href="http://hdl.handle.net/11147/3688">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Improving misuse detection with neural networks ent://SD_ILS/0/SD_ILS:16787 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Demiray, Sadettin.<br/><a href="http://hdl.handle.net/11147/3284">Access to Electronic Version</a><br/>Format:&#160;El Yazması<br/> End-to-end security for mobile devices ent://SD_ILS/0/SD_ILS:17758 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Kayayurt, Barış.<br/><a href="http://hdl.handle.net/11147/3380">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systems ent://SD_ILS/0/SD_ILS:48243 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Application of graph neural networks on software modeling ent://SD_ILS/0/SD_ILS:2204270 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Leblebici, Onur Yusuf, author.<br/><a href="https://hdl.handle.net/11147/11100">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Design and implementation of a domain specific language for event sequence graphs ent://SD_ILS/0/SD_ILS:2262237 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Kalecik, Mert, author.<br/><a href="https://hdl.handle.net/11147/12466">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Wirelless mesh network throughput analysis using petri nets ent://SD_ILS/0/SD_ILS:2262277 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Oğuzer, L&uuml;tf&uuml; Melih Buğra, author.<br/><a href="https://hdl.handle.net/11147/12463">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Development of a machine learning platform for analysis of mitochondrial features in live-cell images ent://SD_ILS/0/SD_ILS:2335770 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Tarkan, Yal&ccedil;ın, author.<br/><a href="https://hdl.handle.net/11147/13251">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Mutation analysis of specification-based contracts in software testing ent://SD_ILS/0/SD_ILS:2204899 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Khalilov, Abbas, author.<br/><a href="https://hdl.handle.net/11147/11152">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> The effect of human-robot interaction on design and use process of home robots ent://SD_ILS/0/SD_ILS:2262283 2024-05-30T23:09:57Z 2024-05-30T23:09:57Z by&#160;Yapıcı, Nur Beril, author.<br/><a href="https://hdl.handle.net/11147/12467">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/>