Model-based mutation testing—approach and case studies F Belli, CJ Budnik, A Hollmann, T Tuglular, WE Wong Science of Computer Programming 120, 25-48, 2016 | 43 | 2016 |
End-to-end security implementation for mobile devices using TLS protocol B Kayayurt, T Tuglular Journal in Computer Virology 2 (1), 87-97, 2006 | 22 | 2006 |
A preliminary structural approach to insider computer misuse incidents T Tuglular 1st European Anti-Malware Conference (EICAR 2000), 2000 | 22 | 2000 |
A framework for characterization of insider computer misuse T Tuglular, EH Spafford Unpublished paper, Purdue University, 1997 | 19 | 1997 |
Test case generation for firewall implementation testing using software testing techniques T Tuglular Proceedings of the International Conference on Security of Inform. and …, 2008 | 18 | 2008 |
Directed acyclic graph modeling of security policies for firewall testing T Tuglular, Ö Kaya, CA Müftüoglu, F Belli 2009 Third IEEE International Conference on Secure Software Integration and …, 2009 | 14 | 2009 |
Event-based input validation using design-by-contract patterns T Tuglular, CA Muftuoglu, F Belli, M Linschulte 2009 20th International Symposium on Software Reliability Engineering, 195-204, 2009 | 13 | 2009 |
Security through human-factors and biometrics S Bakshi, T Tuglular Proceedings of the 6th International Conference on Security of Information …, 2013 | 12 | 2013 |
Optimal graph constraint reduction for symbolic layout compaction P Pan, SK Dong, CL Liu Proceedings of the 30th international Design Automation Conference, 401-406, 1993 | 12 | 1993 |
Model based mutation testing of firewalls T Tuglular, F Belli Fast Abstracts of TAIC-PART Conference, 2008 | 10 | 2008 |
Input contract testing of graphical user interfaces T Tuglular, F Belli, M Linschulte International Journal of Software Engineering and Knowledge Engineering 26 …, 2016 | 9 | 2016 |
A new approach to the specification of general computer security policies I Krsul, E Spafford, T Tuglular COAST Techical Report, 97-13, 1998 | 9 | 1998 |
GUI-based testing of boundary overflow vulnerability T Tuglular, CA Muftuoglu, O Kaya, F Belli, M Linschulte 2009 33rd Annual IEEE International Computer Software and Applications …, 2009 | 8 | 2009 |
Protocol-based testing of firewalls T Tuglular, F Belli 2009 Fourth South-East European Workshop on Formal Methods, 53-59, 2009 | 7 | 2009 |
Enterprise Wide Web Application Security: An Introduction E Karaarslan, T Tuglular, H Sengonca 13th Annual EICAR Conference, 2004 | 7 | 2004 |
An architecture for verification of access control policies with multi agent system ontologies F Tekbacak, T Tuglular, O Dikenelli 2009 33rd Annual IEEE International Computer Software and Applications …, 2009 | 6 | 2009 |
Does Network Awareness Make Difference In Intrusion Detection of Web Attacks E Karaarslan, T Tuglular, H Sengonca ICHIT 2006, 1-10, 2006 | 6 | 2006 |
Automation architecture for Bayesian Network based test case prioritization and execution E Ufuktepe, T Tuglular 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 5 | 2016 |
Feedback control based test case instantiation for firewall testing T Tuglular, G Gercek 2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010 | 5 | 2010 |
Towards test case generation for synthesizable VHDL programs using model checker T Ayav, T Tuglular, F Belli 2010 Fourth International Conference on Secure Software Integration and …, 2010 | 5 | 2010 |