Tuğkan Tuğlular
Associate Professor

Asst. Prof. Tuğkan Tuğlular received the B.S., M.S., and Ph.D. degrees in Computer Engineering from Ege University, Turkey in 1993, 1995 and 1999, respectively. He worked as a research associate at Purdue University from 1996 to 1998. He has been with Izmir Institute of Technology since 2000. After he became Assistant Professor at Izmir Institute of Technology, he worked as Chief Information Officer in the university from 2003-2007. Currently, in addition to his academic duties, he acts as IT advisor to the Rector. He has more than 60 publications and active record of duties with international and national conferences. His current research interests include model-based testing and model-based software development.

  • B.Sc. : Computer Engineering, Ege University (1993)
  • M.Sc. : Computer Engineering, Ege University (1995)
  • Ph.D. : Computer Engineering, Ege University (1999)

Book

  • Tuğlular, T., Velibeyoğlu, K., Tekir, S., "Izmir Bilgi Toplumu Temelli Kalkinma Stratejisi," İzmir Kalkinma Ajansi (IZKA), 2013.
  • Tuğlular, T., Velibeyoğlu, K., Tekir, S., “İzmir Bilgi Toplumu Temelli Kalkınma Stratejisi - Knowledge-based Sustainable Development Strategy for Izmir,” İzmir Kalkınma Ajansı (İZKA), 2013.

Book Chapter

  • Belli, F., Beyazıt, M., Budnik, C.J., Tuğlular, T., “Advances in Model-Based Testing of Graphical User Interfaces,” Advances in Computers, vol. 107, Elsevier, 2017.

Journal Article

  • Ufuktepe, E., Tuğlular, T., “Estimating Software Robustness in Relation to Input Validation Vulnerabilities Using Bayesian Networks,” Software Quality Journal, pp.1-35, 2017.
  • Belli, F., Budnik, C.J., Hollmann, A., Tuğlular, T., Wong, W.E., “Model-based Mutation Testing—Approach and Case Studies,” Science of Computer Programming, vol.120, pp.24-48, May 2016.
  • Tuğlular, T., Belli, F., Linschulte, M., “Input Contract Testing of Graphical User Interfaces,” International Journal of Software Engineering and Knowledge Engineering, vol.26, no.2, pp.183-215, March 2016.
  • Tuğlular, T., Belli, F., Linschulte, M., “Input Contract Testing of Graphical User Interfaces,” International Journal of Software Engineering and Knowledge Engineering, vol.26, no.2, pp.183-215, March 2016.
  • Tuğlular, T., Müftüoğlu, C.A., Belli, F., Linschulte, M., “Model-Based Contract Testing of Graphical User Interfaces,” IEICE Transactions on Information and Systems, vol.E93-D, no.7, pp.1297-1305, July 2015.
  • Tuğlular, T., Müftüoğlu, C.A., Belli, F., Linschulte, M., “Model-Based Contract Testing of Graphical User Interfaces,” IEICE Transactions on Information and Systems, vol.E93-D, no.7, pp.1297-1305, July 2015.
  • Tuğlular, T., “Location Aware Self-adapting Firewall Policies,” WSEAS Transactions on Communications, vol.7, no.6, pp.563-573, June 2008.
  • Kayayurt, B., Tuğlular, T., “End-to-end Security Implementation for Mobile Devices Using TLS Protocol,” Journal of Computer Virology (currently Journal of Computer Virology and Hacking Techniques), vol.2, no.1, pp.87-97, August 2006.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Web Saldırı Saptama ve Engelleme Sistemi Temelleri - Foundations of Web Attack Detection and Prevention Systems,” Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi, vol.2, no.1, pp.107-118, December 2006.
  • Tuğlular, T., Yıldırım, Ş., Sinanoğlu, E.B., Erciyeş, K., Çankara, H.C., “Kişisel Bilgisayar Tabanlı Dağıtık Bir Kontrol Sistemi - A Personal Computer-based Distributed Control System,” Ege Üniversitesi Bilgisayar Araştırma ve Uygulama Merkezi Dergisi, vol.14, no.1, pp.21-27, June 1991.

Conference Paper

  • Ufuktepe, E., Tuğlular, T., “Automation Architecture for Bayesian Network Based Test Case Prioritization and Execution,” IEEE International Workshop on Software Testing Automation (STA) in conjunction with International Conference on Conference on Computer, Software and Applications (COMPSAC), 2016.
  • Belli, F., Linschulte, M., Tuğlular, T., “Karar tablosu destekli olay sıra çizgeleri temelli sınama durum üretim aracı – Decision Table-Supported Tool for Test Case Generation Based on Event Sequence Graphs,” Turkish National Conference on Software Engineering, 2016.
  • Ayav, T., Tuğlular, T., Belli, F., “Model Based Testing of VHDL Programs,” IEEE International Workshop on Software Test Automation, STA, 2015.
  • Ufuktepe, E., Tuğlular, T., “JavaScript Kütüphaneleri için Girdi Doğrulama Analizi - Input Validation Analysis of JavaScript Libraries,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2015.
  • Ufuktepe, E., Tuğlular, T., “JavaScript Kütüphanelerinin Güvenilir Olmayan Verilere Karşı Hazır Olma Durumlarının Bayesian Ağları ile Ölçülmesi - Readiness Measurement of JavaScript Libraries to Untrusted Data using Bayesian Networks,” Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, ISC, 2014.
  • Tuğlular, T., Şentuna, N., Tuğ, A.K., Dağhan, G., Güven, C., “Lojistik Merkez Konteyner Terminal Yönetimi Yazılımı için Alana Özgü Dil Geliştirimi ve Kullanımı - Domain Specific Language Development and Usage for Container Logistics Terminal Management,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2014.
  • Tuğlular, T., Tekir, S., Velibeyoğlu, K., "Mapping Information and Communication Sector in Izmir: Exploring Clustering Potential," Knowledge Cities World Summit, KCWS, 2013.
  • Tuğlular, T., Gerçek, G., “Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing,” IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI, 2011.
  • Ayav, T., Tuğlular, T., Belli, F., “Towards Test Case Generation for Synthesizable VHDL Programs Using Model Checker,” Workshop on Model-based Verification and Validation, MVV, 2010.
  • Tuğlular, T., Gerçek, G., Tos, U., “İnternet Üzerinde Özellik Tabanlı Şifreleme Kullanan Bir Dosya Saklama Ortamı Önerisi - A Proposal for Internet-based File Storage Environment using Attribute-based Encryption,” Türkiye'de İnternet Konferansı, INET-TR, 2010.
  • Tuğlular, T., Gerçek, G., “Feedback Control Based Test Case Instantiation For Firewall Testing,” IEEE International Workshop on Software Cybernetics (IWSC) in conjunction with International Conference on Conference on Computer, Software and Applications (COMPSAC), 2010.
  • Türkmendağ, Ç., Yağcan, İ., Tuğlular, T., “Firewall Policy Visualization with Respect to Port-Based Vulnerabilities,” Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı, ISC, 2010.
  • Gerçek, G., Yarımtepe, O., Tuğlular, T., “A Flow-based Network Traffic Characterization Tool,” Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı, ISC, 2010.
  • Tekbacak, F., Tuğlular, T., Dikenelli, O., “Normatif Çoklu Etmen Sistemlerinde Rol Tabanlı Etmenler İçin Politika Tabanlı Bir Erişim Denetimi Yaklaşımı - Policy-based Access Control Approach for Role-based Agents in Normative Multi-Agent Systems,” Akademik Bilişim Konferansı, AB, 2010.
  • Tekbacak, F., Tuğlular, T., Dikenelli, O., “An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies,” IEEE International Workshop on Engineering Semantic Agent Systems (ESAS) in conjunction with International Conference on Conference on Computer, Software and Applications (COMPSAC), 2009.
  • Tuğlular, T., Belli, F., “Protocol-Based Testing of Firewalls,” South-East European Workshop on Formal Methods, SEEFM, 2009.
  • Tuğlular, T., Müftüoğlu, C.A., Belli, F., Linschulte, M., “Event-Based Input Validation Using Design-by-Contract Patterns,” International Symposium on Software Reliability Engineering, ISSRE, 2009.
  • Tuğlular, T., Müftüoğlu, C.A., Kaya, Ö., Belli, F., Linschulte, M., “GUI Based Testing of Boundary Overflow Vulnerability,” IEEE International Workshop on Software Testing Automation (STA) in conjunction with International Conference on Conference on Computer, Software and Applications (COMPSAC), 2009.
  • Tuğlular, T., Belli, F., “Directed Acyclic Graph Modeling of Security Policies for Firewall Testing,” International Workshop on Model-Based Verification & Validation (MVV ) in conjunction with IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI), 2009.
  • Tekbacak, F., Tuğlular, T., Dikenelli, O., “Çoklu Etmen Sistemlerinde Rol Tabanlı Erişim Denetimi için Bir Yaklaşım Önerisi - A Proposal for Role-based Access Control in Multi-Agent Systems,” Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı (ISC), 2008.
  • Tuğlular, T., Çetin, F., Yarımtepe, O., Gerçek, G., “Firewall Configuration Management Using XACML Policies,” International Telecommunications Network Strategy and Planning Symposium, Networks, 2008.
  • Tekbacak, F., Tuğlular, T., Dikenelli, O., “A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT,” International Conference on Software Engineering and Knowledge Engineering, SEKE, 2008.
  • Tuğlular, T., “Monitoring of Policy Operations in a Distributed Firewall Environment,” International Symposium On Computer Networks, ISCN, 2008.
  • Tuğlular, T., “Automatic Enforcement of Location Aware User Based Network Access Control Policies,” WSEAS International Conference on TELECOMMUNICATIONS and INFORMATICS, TELE-INFO, 2008.
  • Tuğlular, T., Gürcan, G., Samanlı, E., “Merkezi Dosya Saklama Ortamları için Erişim Denetimli Kriptografik Bir Güvenlik Mimarisi - Access Control and Cryptography-based Security Architecture for Central File Storage Environments,” Ağ ve Bilgi Güvenliği Ulusal Sempozyumu, ABG, 2008.
  • Çetin, F., Yarımtepe, O., Tuğlular, T., “Güvenlik Duvarları için Politika Anomali Belirleme Algoritmasının Deneysel Uygulaması - Experimental Evaluation of Policy Anomaly Detection Algorithm to Firewalls,” Akademik Bilişim Konferansı, AB, 2008.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Kurumsal Web Güvenliği Yapısı - Enterprise Web Security Architecture,” Akademik Bilişim Konferansı, AB, 2008.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Enterprise-wide Web Security Infrastructure,” TERENA Networking Conference, TNC, 2007.
  • Tuğlular, T., “Test Case Generation for Firewall Implementation Testing using Software Testing Techniques,” International Conference on Security of Information and Networks, SIN, 2007.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Does Network Awareness Make Difference In Intrusion Detection of Web Attacks,” International Conference on Hybrid Information Technology, ICHIT, 2006.
  • Kayayurt, B., Tuğlular, T., “End-to-end security implementation for mobile devices using TLS protocol,” Annual EICAR Conference, 2006.
  • Asarcıklı, Ş., Tuğlular, T., “Monitoring Firewall Using Intrusion Detection Systems,” International Symposium On Information Technologies, ISIT, 2005.
  • Demiray, S., Tuğlular, T., “Improving Neural Networks Based Intrusion Detection Through Constant Extension of Training Dataset with New Attacks,” International Symposium On Information Technologies, ISIT, 2005.
  • Semerci, H., Tuğlular, T., “Intrusion Prevention Systems: Could They Be Synergy Point of Current Network Security Solutions?,” Annual EICAR Conference, 2004.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Enterprise Wide Web Application Security: An Introduction,” Annual EICAR Conference, 2004.
  • Tuğlular, T., Algan, F., Hışıl, H., Akdemir, O., Altay, O., Örer, Y., “Üniversite Ortamında Yazılım Geliştirme Deneyimleri - Software Development Experiences in University Environment,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2003.
  • Algan, F., Tuğlular, T., Dikenelli, O., “Test Yönelimli Yazılım Geliştirme Metotlarının J2EE Platformu ve Bileşen Modellerine Uygulanması Üzerine Bir Çalışma - Application of Test-driven Software Development Methods to J2EE Platform and Component Models,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2003.
  • Tuğlular, T., Çağrıcı, G., “Construction of A Simple Intrusion Detection System For Alert Correlation Using Freeware Components,” Annual EICAR Conference, 2003.
  • Tuğlular, T., Atay, S., “Cepte Taşınabilir Konferans Çantası - Conference Kit in the Pocket,” Kablosuz Ağlar ve Güvenlik Sempozyumu, WINS, 2002.
  • Tuğlular, T., “Bilgisayar Güvenliği Politikası Değerlendirme Kriterleri - Computer Security Policy Evaluation Criteria,” Türkiye Bilişim Derneği Ulusal Bilişim Kurultayı, 2002.
  • Tuğlular, T., “A Usage Based Computer Security Policy Generator,” Annual EICAR Conference, 2002.
  • Tuğlular, T., “Kablosuz Ağlar İçin Güvenlik Önlemleri - Security Precutions for Wireless Networks,” Kablosuz Ağlar ve Güvenlik Sempozyumu, WINS, 2001.
  • Tuğlular, T., “Functional Requirements Of An Intrusion Management Model,” International Symposium on Computer and Information Sciences, ISCIS, 2001.
  • Tuğlular, T., “Ateş Duvarı ve Nüfuz Tespit Sistemi İnternet'te Güvenlik İçin Yeterli Mi? - Are Firewalls and Intrusion Detection Systems Sufficient for Security on Internet?,” Türkiye'de İnternet Konferansı, INET-TR, 2001.
  • Tuğlular, T., “Nüfuz Yönetim Politikaları - Policies for Intrusion Detection,” Türkiye Bilişim Derneği Ulusal Bilişim Kurultayı, 2001.
  • Tuğlular, T., “Management Practices Of Information Security Policies,” Annual EICAR Conference, 2001.
  • Tuğlular, T., “A Preliminary Structural Approach to Insider Computer Misuse Incidents,” Annual EICAR Conference, 2000.
  • Tuğlular, T., Eren, Ş., “Development Of Policy Rules For Password Systems,” International Symposium on Computer and Information Sciences, ISCIS, 1999.
  • Tuğlular, T., Eren, Ş., “Development of Computer Security Policie - Development of Computer Security Policies,” Yüzyıl Harekatı ve Modern İstihkam Teçhizatı Sempozyumu, 1999.
  • Tuğlular, T., Eren, Ş., “Öğrenci Laboratuvarları İçin Örnek Bir Bilgisayar Kullanım Politikası - An Example Computer Usage Policy for Student Laboratories,” Bilgisayar - Haberleşme Sempozyumu, 1998.
  • Koltuksuz, A., Tuğlular, T., Eren, Ş., “Turizmde Küreselleşmeye Doğru : Elektronik Ticaret - Globalization in Tourism: E-commerce,” Adnan Menderes Üniversitesi Turizm İşletmeciliği ve Otelcilik Yüksekokulu Ulusal Turizm Kongresi, 1998.
  • Tuğlular, T., Eren, Ş., “Bilgisayar Sistemlerinde Beklenmedik Durum Anı ve Sonrası Politikaları - Contingency Polices for Computer Systems,” Türkiye Bilişim Derneği Ulusal Bilişim Kurultayı, 1998.
  • Koltuksuz, A., Tuğlular, T., Eren, Ş., “C3I den C4I ya Geçişte Bilgisayar Güvenliği Kurumları ve Bir Kurum Önerisi - Computer Security Institutions in Transition from C3I to C4I gand An Institution Proposal,” Sistem Mühendisliği Ve Savunma Uygulamaları Sempozyumu, 1995.
  • Koltuksuz, A., Tuğlular, T., Eren, Ş., “Kriptanalizde İstatistiksel Yöntemler ve Türkiye Türkçesi İçin Bir Uygulama - Statistical Methods in Cryptanalysis and Their Application to Turkey Turkish,” Ulusal Ekonometri Ve İstatistik Sempozyumu, 1995.
  • Koltuksuz, A., Şengonca, H., Tuğlular, T., “ATM’lerde Kullanılan Manyetik Kartlar İçin İki Kriptografik Yöntemin Karşılaştırılması - Comparison of Two Cryptographic Methods for Magnetic Cards used in ATMs,” Başbakanlık Devlet İstatistik Enstitüsü, Araştırma Sempozyumu, 1993.

Technical Report

  • Ayav, T., Tuğlular, T., Belli, F., “Transforming VHDL to Timed Automata,” Technical Report, IYTE-COMPENG, 2015.
  • Krsul, I., Tuğlular, T., Spafford, E.H., “A New Approach to the Specification of General Computer Security Policies,” Technical Report, COAST Laboratory, Dept. of Computer Science, Purdue University, West Lafeyette, 1997.

  • Development of Event Sequence Graph based Test Generation Method for Agile Software Product Lines, TÜBİTAK ARDEB 1001