Tugkan Tuglular
Tugkan Tuglular
Associate Professor of Computer Engineering, Izmir Institute of Technology
Verified email at iyte.edu.tr - Homepage
Title
Cited by
Cited by
Year
Model-based mutation testing—approach and case studies
F Belli, CJ Budnik, A Hollmann, T Tuglular, WE Wong
Science of Computer Programming 120, 25-48, 2016
432016
End-to-end security implementation for mobile devices using TLS protocol
B Kayayurt, T Tuglular
Journal in Computer Virology 2 (1), 87-97, 2006
222006
A preliminary structural approach to insider computer misuse incidents
T Tuglular
1st European Anti-Malware Conference (EICAR 2000), 2000
222000
A framework for characterization of insider computer misuse
T Tuglular, EH Spafford
Unpublished paper, Purdue University, 1997
191997
Test case generation for firewall implementation testing using software testing techniques
T Tuglular
Proceedings of the International Conference on Security of Inform. and …, 2008
182008
Directed acyclic graph modeling of security policies for firewall testing
T Tuglular, Ö Kaya, CA Müftüoglu, F Belli
2009 Third IEEE International Conference on Secure Software Integration and …, 2009
142009
Event-based input validation using design-by-contract patterns
T Tuglular, CA Muftuoglu, F Belli, M Linschulte
2009 20th International Symposium on Software Reliability Engineering, 195-204, 2009
132009
Security through human-factors and biometrics
S Bakshi, T Tuglular
Proceedings of the 6th International Conference on Security of Information …, 2013
122013
Optimal graph constraint reduction for symbolic layout compaction
P Pan, SK Dong, CL Liu
Proceedings of the 30th international Design Automation Conference, 401-406, 1993
121993
Model based mutation testing of firewalls
T Tuglular, F Belli
Fast Abstracts of TAIC-PART Conference, 2008
102008
Input contract testing of graphical user interfaces
T Tuglular, F Belli, M Linschulte
International Journal of Software Engineering and Knowledge Engineering 26 …, 2016
92016
A new approach to the specification of general computer security policies
I Krsul, E Spafford, T Tuglular
COAST Techical Report, 97-13, 1998
91998
GUI-based testing of boundary overflow vulnerability
T Tuglular, CA Muftuoglu, O Kaya, F Belli, M Linschulte
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
82009
Protocol-based testing of firewalls
T Tuglular, F Belli
2009 Fourth South-East European Workshop on Formal Methods, 53-59, 2009
72009
Enterprise Wide Web Application Security: An Introduction
E Karaarslan, T Tuglular, H Sengonca
13th Annual EICAR Conference, 2004
72004
An architecture for verification of access control policies with multi agent system ontologies
F Tekbacak, T Tuglular, O Dikenelli
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
62009
Does Network Awareness Make Difference In Intrusion Detection of Web Attacks
E Karaarslan, T Tuglular, H Sengonca
ICHIT 2006, 1-10, 2006
62006
Automation architecture for Bayesian Network based test case prioritization and execution
E Ufuktepe, T Tuglular
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
52016
Feedback control based test case instantiation for firewall testing
T Tuglular, G Gercek
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
52010
Towards test case generation for synthesizable VHDL programs using model checker
T Ayav, T Tuglular, F Belli
2010 Fourth International Conference on Secure Software Integration and …, 2010
52010
The system can't perform the operation now. Try again later.
Articles 1–20