Search Results for Tuğlular, Tuğkan, - Narrowed by: TezSirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dTu$0025C4$00259Flular$00252C$002bTu$0025C4$00259Fkan$00252C$0026qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253ATEZ$002509Tez$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300?2024-05-30T23:09:57ZPolicy anomaly reporting for distributed firewallsent://SD_ILS/0/SD_ILS:163282024-05-30T23:09:57Z2024-05-30T23:09:57Zby Çetin, Füsun.<br/><a href="http://hdl.handle.net/11147/3197">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Automatic question generation using natural language processing techniquesent://SD_ILS/0/SD_ILS:20755792024-05-30T23:09:57Z2024-05-30T23:09:57Zby Keklik, Onur, author.<br/><a href="http://hdl.handle.net/11147/6938">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Developing a security mechanism for software agentsent://SD_ILS/0/SD_ILS:188542024-05-30T23:09:57Z2024-05-30T23:09:57Zby Tekbacak, Fatih.<br/><a href="http://hdl.handle.net/11147/3438">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Tag based storage and retrieval system for organization related newsent://SD_ILS/0/SD_ILS:21339392024-05-30T23:09:57Z2024-05-30T23:09:57Zby Parkın, Kübra, author.<br/><a href="https://hdl.handle.net/11147/7391">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Traffic generator for firewall testingent://SD_ILS/0/SD_ILS:412352024-05-30T23:09:57Z2024-05-30T23:09:57Zby Kaya, Özgür.<br/><a href="http://hdl.handle.net/11147/3631">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Web Services Security: A Proposed Architecture For Interdomain Trust Relationshipent://SD_ILS/0/SD_ILS:254022024-05-30T23:09:57Z2024-05-30T23:09:57Zby Hendrickson, Selim L.Y.<br/><a href="http://hdl.handle.net/11147/3469">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Test driven software developmentent://SD_ILS/0/SD_ILS:168132024-05-30T23:09:57Z2024-05-30T23:09:57Zby Algan, Fatih.<br/><a href="http://hdl.handle.net/11147/3291">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Comparison of recovery requirements with investigation requirements for intrusion management systemsent://SD_ILS/0/SD_ILS:252472024-05-30T23:09:57Z2024-05-30T23:09:57Zby Arpaçay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Development of a Quality Assurance Prototype for Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:187282024-05-30T23:09:57Z2024-05-30T23:09:57Zby Yüksel, Ulaş.<br/><a href="http://hdl.handle.net/11147/3428">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Domain-specific modeling based feature-oriented automatic test generation methodology for software product linesent://SD_ILS/0/SD_ILS:21339942024-05-30T23:09:57Z2024-05-30T23:09:57Zby Şensülün, Sercan, author.<br/><a href="https://hdl.handle.net/11147/7347">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Tag-based dynamic ranking system for organization related newsent://SD_ILS/0/SD_ILS:20444002024-05-30T23:09:57Z2024-05-30T23:09:57Zby Özkan, Mustafa Tunahan, author.<br/><a href="http://hdl.handle.net/11147/6908">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>A detection and correction approach for overflow vulnerabilities in graphical user interfacesent://SD_ILS/0/SD_ILS:1006572024-05-30T23:09:57Z2024-05-30T23:09:57Zby Müftüoğlu, Can Arda.<br/><a href="http://hdl.handle.net/11147/3013">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Access monitoring system for distributed firewall policiesent://SD_ILS/0/SD_ILS:857052024-05-30T23:09:57Z2024-05-30T23:09:57Zby Çakı, Oğuzhan.<br/><a href="http://hdl.handle.net/11147/3953">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Container damage detection and classification using container imagesent://SD_ILS/0/SD_ILS:21340502024-05-30T23:09:57Z2024-05-30T23:09:57Zby İmamoğlu, Zeynep, author.<br/><a href="https://hdl.handle.net/11147/7497">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Analysis of intrusion prevention methodsent://SD_ILS/0/SD_ILS:474612024-05-30T23:09:57Z2024-05-30T23:09:57Zby Semerci, Hakan.<br/><a href="http://hdl.handle.net/11147/3695">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Development of co-evolution tracker tool for nsoftware with acceptance criteriaent://SD_ILS/0/SD_ILS:22802612024-05-30T23:09:57Z2024-05-30T23:09:57Zby Yalçın, Ali Görkem, author.<br/><a href="https://hdl.handle.net/11147/12714">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Development of a distributed firewall administration toolent://SD_ILS/0/SD_ILS:174182024-05-30T23:09:57Z2024-05-30T23:09:57Zby Erdoğan, Yunus.<br/><a href="http://hdl.handle.net/11147/3360">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Firewall monitoring using intrusion detection systemsent://SD_ILS/0/SD_ILS:168172024-05-30T23:09:57Z2024-05-30T23:09:57Zby Asarcıklı, Şükran.<br/><a href="http://hdl.handle.net/11147/3295">Access to Electronic Version</a><br/>Format: El Yazması<br/>A model-based test generation approach for agile software product linesent://SD_ILS/0/SD_ILS:21464212024-05-30T23:09:57Z2024-05-30T23:09:57Zby Öztürk, Dilek, author.<br/><a href="https://hdl.handle.net/11147/10818">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Test case prioritization for regression testing using change impact analysisent://SD_ILS/0/SD_ILS:21338892024-05-30T23:09:57Z2024-05-30T23:09:57Zby Ufuktepe, Ekincan, author.<br/><a href="https://hdl.handle.net/11147/7432">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Collection and classification of javascript libraries included in websiteent://SD_ILS/0/SD_ILS:5178872024-05-30T23:09:57Z2024-05-30T23:09:57Zby Atıcı, İrem, author.<br/><a href="http://hdl.handle.net/11147/4331">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Measurement of javascript applications' readiness to untrusted data using bayesian networksent://SD_ILS/0/SD_ILS:4683082024-05-30T23:09:57Z2024-05-30T23:09:57Zby Ufuktepe, Ekincan, author.<br/><a href="http://hdl.handle.net/11147/4249">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Campus network topology discovery and distributed firewall policy generationent://SD_ILS/0/SD_ILS:1293602024-05-30T23:09:57Z2024-05-30T23:09:57Zby Çalışkan, Ezgi.<br/><a href="http://hdl.handle.net/11147/3102">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Anomaly detection using network traffic characterizationent://SD_ILS/0/SD_ILS:250272024-05-30T23:09:57Z2024-05-30T23:09:57Zby Yarımtepe, Oğuz.<br/><a href="http://hdl.handle.net/11147/3459">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Development of a static analysis tool to find securty vulnerabilities in java applicationsent://SD_ILS/0/SD_ILS:1063912024-05-30T23:09:57Z2024-05-30T23:09:57Zby Topuz, Bertan.<br/><a href="http://hdl.handle.net/11147/3039">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Development of a web services security archhitecture based on net frameworkent://SD_ILS/0/SD_ILS:462282024-05-30T23:09:57Z2024-05-30T23:09:57Zby Bacı, Recep.<br/><a href="http://hdl.handle.net/11147/3688">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Improving misuse detection with neural networksent://SD_ILS/0/SD_ILS:167872024-05-30T23:09:57Z2024-05-30T23:09:57Zby Demiray, Sadettin.<br/><a href="http://hdl.handle.net/11147/3284">Access to Electronic Version</a><br/>Format: El Yazması<br/>End-to-end security for mobile devicesent://SD_ILS/0/SD_ILS:177582024-05-30T23:09:57Z2024-05-30T23:09:57Zby Kayayurt, Barış.<br/><a href="http://hdl.handle.net/11147/3380">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systemsent://SD_ILS/0/SD_ILS:482432024-05-30T23:09:57Z2024-05-30T23:09:57Zby Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Application of graph neural networks on software modelingent://SD_ILS/0/SD_ILS:22042702024-05-30T23:09:57Z2024-05-30T23:09:57Zby Leblebici, Onur Yusuf, author.<br/><a href="https://hdl.handle.net/11147/11100">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Design and implementation of a domain specific language for event sequence graphsent://SD_ILS/0/SD_ILS:22622372024-05-30T23:09:57Z2024-05-30T23:09:57Zby Kalecik, Mert, author.<br/><a href="https://hdl.handle.net/11147/12466">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Wirelless mesh network throughput analysis using petri netsent://SD_ILS/0/SD_ILS:22622772024-05-30T23:09:57Z2024-05-30T23:09:57Zby Oğuzer, Lütfü Melih Buğra, author.<br/><a href="https://hdl.handle.net/11147/12463">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Development of a machine learning platform for analysis of mitochondrial features in live-cell imagesent://SD_ILS/0/SD_ILS:23357702024-05-30T23:09:57Z2024-05-30T23:09:57Zby Tarkan, Yalçın, author.<br/><a href="https://hdl.handle.net/11147/13251">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>Mutation analysis of specification-based contracts in software testingent://SD_ILS/0/SD_ILS:22048992024-05-30T23:09:57Z2024-05-30T23:09:57Zby Khalilov, Abbas, author.<br/><a href="https://hdl.handle.net/11147/11152">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>The effect of human-robot interaction on design and use process of home robotsent://SD_ILS/0/SD_ILS:22622832024-05-30T23:09:57Z2024-05-30T23:09:57Zby Yapıcı, Nur Beril, author.<br/><a href="https://hdl.handle.net/11147/12467">Access to Electronic Versiyon.</a><br/>Format: El Yazması<br/>