Yayınlar

Yayınlar

Kitap

  • Tuğlular, T., Velibeyoğlu, K., Tekir, S., "Izmir Bilgi Toplumu Temelli Kalkinma Stratejisi," İzmir Kalkinma Ajansi (IZKA), 2013.
  • Tuğlular, T., Velibeyoğlu, K., Tekir, S., “İzmir Bilgi Toplumu Temelli Kalkınma Stratejisi - Knowledge-based Sustainable Development Strategy for Izmir,” İzmir Kalkınma Ajansı (İZKA), 2013.
  • Tekir, S., "Open Source Intelligence Analysis A Methodological Approach," VDM Verlag, 2009.
  • Ergenç Bostanoğlu, B., “Data Integration in Large Scale: Mobile Query Execution Model,” VDM Verlag Publishing, 2009.
  • İkiz, F., Püskülcü, H., Eren, Ş., “İstatistiğe Giriş,” Barış Yayınları Fakülteler Kitabevi, 2000.

Kitap Bölümü

  • Yilmaz, G., Akcamete, A., Demirors, O., “An Assessment of BIM-CAREM Against the Selected BIM Capability Assessment Models,” Advances in Informatics and Computing in Civil and Construction Engineering, Springer, Cham, 2019.
  • Belli, F., Beyazıt, M., Budnik, C.J., Tuğlular, T., “Advances in Model-Based Testing of Graphical User Interfaces,” Advances in Computers, vol. 107, Elsevier, 2017.
  • Chingovska, I., Erdoğmuş, N., Anjos, A., Marcel, S., “Face Recognition Systems under Spoofing Attacks,” Face Recognition Across the Imaging Spectrum, Springer, 2016.
  • Baştanlar, Y., Özuysal, M., "Introduction to Machine Learning", miRNomics: MicroRNA Biology and Computational Analysis, Springer Protocols, Humana Press. 2014.
  • Yıldız, B., Ergenç Bostanoğlu, B., “Integrated Approach For Privacy Preserving Itemset Mining,” Lecture Notes in Electrical Engineering, vol.110, Springer, 2011.

Makale

  • Akdur, D., Garousi, V., Demirors, O., “A survey on modeling and model-driven engineering practices in the embedded software industry,” Journal of Systems Architecture, 2019.
  • Turetken, O., Dikici, A., Vanderfeesten, I.T.P., Rompen, T.M.P., Demirors, O., “The influence of using collapsed sub-processes and groups on the understandability of business process models,” The International Journal of Business and Information Systems Engineering, 2019.
  • Top, O.O., Demirors, O., “Application of a software agility assessment model – AgilityMod in the field,” Computer Standards & Interfaces, 2019.
  • Garousi, V., Tarhan, A., Pfahl, D., Coşkunçay, A., Demirors, O., “Correlation of critical success factors with success of software projects: an empirical investigation,” Software Quality Journal, 2019.
  • Öztürk, A.C., Ergenç Bostanoğlu, B., "Dynamic Itemset Hiding Algorithm for Multiple Sensitive Support Thresholds", International Journal of Data Warehousing and Mining, vol.14, no.2, pp.37-59, 2018. 
  • Şahin, S., "Privacy Issues on Social Networks", International Journal of Information Security Science, IJJISS, vol.7, no.2, pp.60-66, 2018.
  • Karataş, A., Şahin, S., "Sosyal Bot Algılama Teknikleri ve Araştırma Yöntemleri Üzerine Bir İnceleme", Uluslararasi Bilgi Güvenliği Mühendisliği Dergisi, DergiPark, vol.4, no.1, pp.10-20, 2018.
  • Orhan, S., Baştanlar, Y., "Training CNNs with Image Patches for Object Localisation", Electronics Letters, vol.54, no.7, pp.424-426, 2018. 
  • Salmanoglu, M., Coskucay, A., Yildiz, A., Demirors, O., “An Exploratory Case Study for Assessing the Measurement Capability of an Agile Organization,” Software Quality Professional Magazine, vol.20, no.2, 2018.
  • Dikici, A., Turetken, O., Demirors, O., “Factors Influencing the Understandability of Process Models: A Systematic Literature Review,” Information and Software Technology, vol.93, 2018.
  • Aysolmaz, B., Leopold, H., Reijers, H.A., Demirors, O., “A Semi-automated Approach for Generating Natural Language Requirements Documents Based on Business Process Models,” Information and Software Technology, vol.93, 2018.
  • Karaimer, H.C., Barış, I., Baştanlar, Y., "Detection and Classification of Vehicles from Omnidirectional Videos Using Multiple Silhouettes," Pattern Analysis and Applications, vol.20, no.3, pp.893-905, August 2017.
  • Ayav, T., “IEEE 802.11 Kablosuz Ağları için Bir Gerçek Zamanlı İletişim Protokolü - A Real-Time Communication Protocol for IEEE 802.11 Wireless Networks,” DEÜ Fen ve Mühendislik Dergisi, vol.19, no.55, pp.1-15, January 2017.
  • Ayav, T., “Prioritizing MCDC test cases by spectral analysis of boolean functions,” Software Testing, Verification and Reliability, August 2017.
  • Oğuz, D., Yin, S., Ergenç Bostanoğlu, B., Hameurlain, A., Dikenelli, O., “Extended Adaptive Join Operator with Bind-Bloom Join for Federated SPARQL Queries,” International Journal of Data Warehousing and Mining, vol.13, no.3, 2017.
  • Ufuktepe, E., Tuğlular, T., “Estimating Software Robustness in Relation to Input Validation Vulnerabilities Using Bayesian Networks,” Software Quality Journal, pp.1-35, 2017.
  • Tekin, L., Şahin, S., “Implementation and Evaluation of Improved Secure Index Scheme Using Standard and Counting Bloom Filters,” International Journal of Information Security Science, vol.6, no.4, pp.46-56, December 2017.
  • Şahin, S., Aslanoğlu, R., “Comparison of Group Key Establishment Protocols,” Turkish Journal of Electrical Engineering and Computer Sciences, vol.25, pp.46-57, January 2017.
  • Çiloğlugil, B., Aslan, B.G., İnceoğlu, M.M., “Lise Öğrencilerine Bilgisayar Donanımı Öğretimi: Devremi Kuruyorum,” Ege Eğitim Dergisi, vol.18, no.1, pp.266-287, 2017.
  • Baştanlar, Y., "A Simplified Two-View Geometry Based External Calibration Method for Omnidirectional and PTZ Camera Pairs," Pattern Recognition Letters, vol.71, pp.1-7, February 2016. 
  • Çınaroğlu, İ., Baştanlar, Y. , "A Direct Approach for Object Detection with Catadioptric Omnidirectional Cameras," Signal, Image and Video Processing, vol.10, no.2, pp. 413-420, February 2016.
  • Uzyıldırım, F. E., Özuysal, M., "Instance Detection by Keypoint Matching beyond the Nearest Neighbor," Signal, Image and Video Processing, Vol. 10, Nr. 8, pp. 1527 - 1534, November 2016.
  • Abdella, J., Özuysal, M., Tomur, E., "CA‐ARBAC: Privacy Preserving Using Context‐Aware Role‐Based Access Control on Android Permission System," Security and Communication Networks, vol.9, no.18, pp.5977-5995, 2016.
  • Taştekin, S.Y., Erten, Y.M. and Bilgen, S., "Accounting for Product Similarity in Software Project Duration Estimation," International Journal of Software Engineering and Knowledge Engineering, vol.26, no.01, pp.63-86, January, 2016.
  • Ayav, T., Sözer, H., “Identifying critical architectural components with spectral analysis of fault trees,” Applied Soft Computing, vol.49, pp.1270-1282, 2016.
  • Belli, F., Budnik, C.J., Hollmann, A., Tuğlular, T., Wong, W.E., “Model-based Mutation Testing—Approach and Case Studies,” Science of Computer Programming, vol.120, pp.24-48, May 2016.
  • Tuğlular, T., Belli, F., Linschulte, M., “Input Contract Testing of Graphical User Interfaces,” International Journal of Software Engineering and Knowledge Engineering, vol.26, no.2, pp.183-215, March 2016.
  • Tuğlular, T., Belli, F., Linschulte, M., “Input Contract Testing of Graphical User Interfaces,” International Journal of Software Engineering and Knowledge Engineering, vol.26, no.2, pp.183-215, March 2016.
  • Belli, F., Budnik, C.J., Hollmann, A., Tuğlular, T., Wong, W.E., “Model-based Mutation Testing—Approach and Case Studies,” Science of Computer Programming, vol.120, pp.24-48, May 2016.
  • Ayav, T., Ergenç, B., “Full-Exact Approach for Frequent Itemset Hiding,” International Journal of Data Warehousing and Mining, vol.11, no.4, pp.49-63, November 2015.
  • Tos, U., Mokadem, R., Hameurlain, A., Ayav, T., Bora, S., “Dynamic replication strategies in data grid systems: a survey,” The Journal of Supercomputing, 2015.
  • Oğuz D., Ergenç Bostanoğlu, B., Yin, S., Dikenelli, O., Hameurlain, A., “Federated Query Processing on Linked Data: A Qualitative Survey and Open Challenges,” The Knowledge Engineering Review, vol.30, no.5, pp.545-563, 2015.
  • Tuğlular, T., Müftüoğlu, C.A., Belli, F., Linschulte, M., “Model-Based Contract Testing of Graphical User Interfaces,” IEICE Transactions on Information and Systems, vol.E93-D, no.7, pp.1297-1305, July 2015.
  • Tuğlular, T., Müftüoğlu, C.A., Belli, F., Linschulte, M., “Model-Based Contract Testing of Graphical User Interfaces,” IEICE Transactions on Information and Systems, vol.E93-D, no.7, pp.1297-1305, July 2015.
  • Baştanlar, Y., "Reduced egomotion estimation drift using omnidirectional views," Electronic Letters on Computer Vision and Image Analysis, vol.13(3), p.1-12, 2014.
  • Aslan, B.G., Öztürk, Ö., İnceoğlu, M.M., “Effect of Bayesian Student Modeling on Academic Achievement in Foreign Language Teaching (University Level English Preparatory School Example),” EDAM Educational Sciences: Theory & Practice, vol.14, no.3, pp.1160-1168, 2014.
  • Aslan, B.G., Öztürk, Ö., İnceoğlu, M.M., “İnternet Üzerinden Yabancı Dil Öğretiminde Bayes Öğrenci Modellemesi Yaklaşımının Akademik Başarıya Etkisi (Üniversite İngilizce Hazırlık Örneği),” Kuram ve Uygulamada Eğitim Bilimleri, vol.14, no.3, pp.1143-1168, 2014.
  • Oğuz, D., Yıldız, B., Ergenç Bostanoğlu, B., “Matrix-Based Dynamic Itemset Mining Algorithm,” International Journal of Data Warehousing and Mining, vol.9, no.4, pp.62-75, 2013.
  • Ladicky, L., Sturgess, P., Russell, C., Sengupta, S., Baştanlar, Y., Clocksin, W., Torr, P.H.S., "Joint Optimization for Object Class Segmentation and Dense Stereo Reconstruction," International Journal of Computer Vision, vol.100, no.2, p.122–133, 2012.
  • Tekir, S., "Reading CS Classics," Communications of the ACM, vol.55, no.4, pp.32-34, April 2012.
  • Tekir, S., Mansmann, F., Keim, D., "Geodesic Distances for Clustering Linked Text Data," Journal of Artificial Intelligence and Soft Computing Research, vol.2, no.4, 2012.
  • Özbek, B., Ayav, T., Yatır, M.N., Kirişken, B., “Television Rating Measurement System Design,” EMO The Journal of Electrical, Electronics, Computer and Biomedical Engineering, vol.1, no.2, pp.89-94, December 2011.
  • Atay, S., Masera, M., “Challenges for the Security Analysis of Next Generation Networks,” Information Security Technical Report, vol.16, no.1, pp.3-11, February 2011.
  • Mavi, A., Cermik, T.F., Urhan, M., Püskülcü, H., Basu, S., Cucchiara, A.J., Jian, Q.Y., Alavi, A., “The Effect of Age, Menopausal State, and Breast Density on 18F-FDG Uptake in Normal Glandular Breast Tissue,” Journal of Nuclear Medicine, vol.51, no.3, pp.347-352, 2010.
  • Ayav, T., Fradet, P., Girault, A., “Implementing fault-tolerance in real-time programs by automatic program transformations,” ACM Transactions on Embedded Computing Systems, vol.7, no.4, pp.1-43, July 2008.
  • Tuğlular, T., “Location Aware Self-adapting Firewall Policies,” WSEAS Transactions on Communications, vol.7, no.6, pp.563-573, June 2008.
  • Mavi, A., Cermik, T., Urhan, M., Basu, S., Püskülcü, H., Yu, M., Hongming, Z., Alavi, A., “The Effects of Age, Density and Menopausal State on FDG Uptake in Normal Breast Tissue and Interactions Among Them,” Journal of Nuclear Medicine, vol.49, no.Supplement 1, pp.264P-264P, 2008.
  • Mavi, A., Cermik, T., Urhan, M., Basu, S., Püskülcü, H., Yu, M., Zhuang, H., Alavi, A., “The Role of Receptor State of Breast Cancer on FDG Uptake at Dual Time Point Imaging,” Journal of Nuclear Medicine, vol.49, no.Supplement 1, pp.343P-343P, 2008.
  • Mavi, A., Cermik, T.F., Urhan, M., Püskülcü, H., Basu, S., Jian, Q.Y., Zhuang, H., Czerniecki, B., Alavi, A., “The Effects of Estrogen, Progesterone, and C-erbB-2 Receptor States on 18F-FDG Uptake of Primary Breast Cancer Lesions,” Journal of Nuclear Medicine, vol.48, no.8, pp.1266-1272, 2007.
  • Mavi, A., Cermik, T., Urhan, M., Püskülcü, H., Zhuang, H., Newberg, A., Alavi, A., “Dual Time Point FDG-PET Imaging in Patients with Newly Diagnosed Breast Cancer,” Journal of Nuclear Medicine, vol.48, no.Supplement 2, pp.366P-366P, 2007.
  • Mavi, A., Cermik, T., Urhan, M., Püskülcü, H., Zhuang, H., Newberg, A., Alavi, A., “The Performance of FDG-PET Imaging for Detecting and Staging of Axillary Lymph Node Metastasis Compared to Sentinal Node Based Biopsy Results,” Journal of Nuclear Medicine, vol.48, no.Supplement 2, pp.366P-366P, 2007.
  • Mavi, A., Cermik, T., Urhan, M., Püskülcü, H., Zhuang, H., Newberg, A., Alavi, A., “Dual Time Point Imaging in Differentiating Post Biopsy Inflammation from Invasive Tumor in Patients with Newly Diagnosed Breast Cancer,” Journal of Nuclear Medicine, vol.48, no.Supplement 2, pp.367P-367P, 2007.
  • Mavi, A., Cermik, T., Urhan, M., Püskülcü, H., Zhuang, H., Newberg, A., Alavi, A., “The Effect of Receptor State of Breast Cancer on FDG Uptake at Dual Time Point Imaging,” Journal of Nuclear Medicine, vol.48, no.Supplement 2, pp.140P-140P, 2007.
  • Kayayurt, B., Tuğlular, T., “End-to-end Security Implementation for Mobile Devices Using TLS Protocol,” Journal of Computer Virology (currently Journal of Computer Virology and Hacking Techniques), vol.2, no.1, pp.87-97, August 2006.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Web Saldırı Saptama ve Engelleme Sistemi Temelleri - Foundations of Web Attack Detection and Prevention Systems,” Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi, vol.2, no.1, pp.107-118, December 2006.
  • Ayav, T., Yılmaz, S., “Implementation of Real-Time Adaptive Scheduling technique on RTLinux,” Turkish Informatics Foundation Journal of Computer Sciences and Engineering, vol.1, no.1, pp.81-89, 2005.
  • Ergenç Bostanoğlu, B., Morvan, F., Hameurlain, A., “Query Optimization: Mobile Agents versus Accuracy of the Cost Estimation,” International Journal of Computer Systems Science and Engineering, vol.20, no.3, pp.161-168, 2005.
  • Ergenç Bostanoğlu, B., Morvan, F., Hameurlain, A., “Mobile Operators for Restricted Sources,” International Journal on Mobile Information System, IOS Press, vol.1, no.3, pp.167-184, 2005.

Bildiri

  • Kılınççeker, O., Türk, E., Challenger, M., Belli, F., “Applying the Ideal Testing Framework to HDL Programs,” International Conference on Architecture of Computing Systems, ARCS, Workshop on Dependability and Fault Tolerance, VERFE, 2018.
  • Sayin, B., Şahin, S., "An Analysis of Rumor Spreading Fundamentals with a Case Study on Facebook", International Conference on Advanced Technologies, Computer Engineering and Science, ICATCES, 2018.
  • Kaplan, S.P., Şahin, S., "Blockchain : A Decentralized Approach to Big Data", International Conference on Advanced Technologies, Computer Engineering and Science, ICATCES, 2018.
  • Özgür, H.G., Şahin, S., "Forensic Analysis of Persistent Data Storages Analyzing NTFS Formatted Drives", International Conference on Advanced Technologies, Computer Engineering and Science, ICATCES, 2018.
  • Tekin, L., Özgür, H.G., Sayin, B., Karataş, A., Şenkula, P., İrtem, E., "EDU-VOTING: An Educational Homomorphic e-Voting System", International Conference on Advanced Technologies, Computer Engineering and Science, ICATCES, 2018.
  • Yilmaz, G., Akcamete, A., Demirors, O., “Adapting SPICE for Development of a Reference Model for Building Information Modeling - BIM-CAREM,” Software Process Improvement and Capability Determination, SPICE, 2018.
  • Erdem, S., Demirors, O., Rabhi, F., “Systematic Mapping Study on Process Mining in Agile Software Development,” Software Process Improvement and Capability Determination, SPICE, 2018.
  • Yürüm, O.R., Demirors, O., Rabhi, F., “A Comprehensive Evaluation of Agile Maturity Self-assessment Surveys,” Software Process Improvement and Capability Determination, SPICE, 2018.
  • Efe, P., Demirors, O., Benetallah, B., “Measuring Change in Software Projects Through an Earned Value Lens,” Software Process Improvement and Capability Determination, SPICE, 2018.
  • Omural, N.K., Demirors, O., “Exploring Reuse Levels in ERP projects in Search of an Effort Estimation Approach,” Proceedings of the 43th Euromicro Conference on Software Engineering and Advanced Applications, 2018.
  • Akdur, D., Demirors, O., Say, B., “Towards Modeling Patterns for Embedded Software Industry: Feedback from the Field,” Proceedings of the 43th Euromicro Conference on Software Engineering and Advanced Applications, 2018.
  • Erdoğmuş, N., “Türkçe Manzara Metni Veri Kümesi – Scene Text Dataset in Turkish," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2017.
  • Mezgil, B., Erdoğan, D., Alduran, Y., Yıldız, U.H., Arslan-Yıldız, A., Baştanlar, Y., "Düşük Sükroz Derişimlerinin Görünür Bölge Spektroskopisi ve Yapay Sinir Ağları ile Kestirimi - Estimation of Low Sucrose Concentrations by UV-Vis Spectroscopy and Artificial Neural Networks," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2017.
  • Orhan, S., Baştanlar, Y., "Parça Tabanlı Eğitimin Evri şimli Yapay Sinir Ağları ile Nesne Konumlandırma Üzerindeki Etkisi - Effect of Patch Based Training on Object Localization with Convolutional Neural Networks," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2017.
  • Barış, İ., Baştanlar, Y., "Classification and Tracking of Traffic Scene Objects with Hybrid Camera Systems," IEEE International Transportation Systems Conference, ITSC, 2017.
  • Köksal, A., Uzyıldırım, F.E., Özuysal, M., "Üç Boyutlu Sahneler ve Nesne Tanıma için Gürbüz Anahtar Nokta Eşleştirilmesi - Robust Keypoint Matching for Three Dimensional Scenes and Object Recognition," IEEE Sinyal İşleme ve İletişim Uygulamaları KurultayıSIU, 2017.
  • Toprak, M., Özkahraman, Ö., Tekir, S., "A News Chain Evaluation Methodology along with a Lattice-based Approach for News Chain Construction," EMNLP Workshop: Natural Language Processing meets Journalism, 2017.
  • Sezerer, E., Tekir, S., "A Relativistic Opinion Mining Approach to Detect Factual or Opinionated News Sources," International Conference on Big Data Analytics and Knowledge Discovery, DaWaK, 2017.
  • Sevgili, Ö., Nima, G., Tekir, S., "N-Hance at SemEval-2017 Task 7: A Computational Approach using Word Association for Puns," International Workshop on Semantic Evaluation, SemEval, 2017.
  • Öztürk, A. C., Ergenç Bostanoğlu, B., “Itemset Hiding under Multiple Sensitive Support Thresholds,” International Conference on Knowledge Management and Information Sharing, KMIS, 2017.
  • Darrab, S., Ergenç Bostanoğlu, B., “Vertical Pattern Mining Algorithm for Multiple Support Thresholds,” International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, KES, 2017.
  • Abuzayed, N., Ergenç Bostanoğlu, B., “Comparison of Dynamic Itemset Mining Algorithms for Multiple Support Thresholds,” International Database Engineering and Applications Symposium, IDEAS, 2017.
  • Çine, E., Kumova, B. İ., “An Extended Syllogistic Logic for Automated Reasoning,” International Conference on Computer Science and Engineering, UBMK, 2017.
  • Ömüral, N.K., Demirörs, O., “Effort Estimation Methods for ERP Projects based on Function Points: A Case Study,” ACM International Conference Proceeding Series, 2017.
  • Sayin, B., Şahin, S., “A Novel Approach to Information Spreading Models for Social Networks,” International Conference on Data Analytics, IARIA, 2017.
  • Şahin, S., “A New Solution Direction for Cyber Security,” Deep Learning and Big Data in Cybersecurity Panel, IARIA, 2017.
  • Öztürk, E., Şahin, S., “A Comparison Study of Apriori, Eclat, FP-Growth and Max-Miner Itemset Mining Algorithms in terms of Dataset Characteristics,” International Advanced Technologies Symposium, IATS, 2017.
  • Tekin, L., Şahin, S., “Implementation and Evaluation of Improved Secure Index Scheme Using Standard and Counting Bloom Filters,” Uluslararası Bilgi Güvenligi ve Kriptoloji Konferansı, ISCTurkey, 2017.
  • Karataş, A., Şahin, S., “A Review on Social Bot Detection Techniques and Research Directions,” Uluslararası Bilgi Güvenligi ve Kriptoloji Konferansı, ISCTurkey, 2017.
  • Çine, E., Kumova, B.İ., “An Extended Syllogistic Logic for Automated Reasoning,” International Conference on Computer Science and Engineering, UBMK, 2017.
  • Erşahin, B., Aktaş, Ö., Kılınç, D., Akyol, C., “Twitter fake account detection,” International Conference on Computer Science and Engineering, UBMK, 2017.
  • Subramanyan, R., Belli, F., “Message from the STA 2017,” IEEE International COMPSAC Workshop on Software Test Automation, STA, 2017.
  • Belli, F., “On the Formal Fundaments of Software Engineering, Keynote Speech,” Turkish National Software Engineering Symposium, UYMS, 2017.
  • Kılınççeker, O., Belli, F., “Grafiksel kullanıcı arayüzleri için düzenli ifade bazlı test kapsama kriterleri – Coverage criteria for testing graphical user interfaces based on regular expressions,” Turkish National Software Engineering Symposium, UYMS, 2017.
  • Yemni, Ben, Ayed, L., Belli, F., Ben, Younes, A., Bendaly, Hlaoui, Y., “Message from the MVDA 2017 Workshop Organizers,” IEEE Computer Society Signature Conference on Computers, Software and Applications, COMPSAC, 2017.
  • Rabhi, F., Bandara, M., Namvar, A., Demirors, O., “Big Data Analytics Has Little to Do with Analytics,” Service Research and Innovation, ASSRI, 2017.
  • Barış, I., Baştanlar, Y., "Tümyönlü ve PTZ Kameralar ile Taşıt Sınıflandırması - Classification of Vehicles with Omnidirectional and PTZ Cameras," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2016.
  • Orhan, S., Baştanlar, Y., "Detecting Photos with Leopards Using Convolutional Neural Networks," International Conference on Computer Science and Engineering, UBMK, 2016.
  • Özuysal, M., "Mobil Nesne Takibinin Hızlandırılması - Accelerating Mobile Object Tracking," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2016.
  • Yafay, E., Tekir, S., "Sosyal Çizgeler İçin Arama Motoru Geliştirilmesi," Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2016.
  • Kavzak, D., Ayav, T., Belli, F., “Neden Sonuç Çizgelerinden Test Girişlerinin Oluşturulması,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2016.
  • Uzun, B., Ayav, T., Dede, M.İ.C., Berker, M., Işıkay, İ., Hanalioğlu, Ş., Özdemirel, B., Kiper, G., Tatlıcıoğlu, E., Maaroof, O.W., Işıtman, O., Ateş, G., Yaşır, A., “Neuroboscope Sisteminin Model Tabanlı Sınaması,” Otomatik Kontrol Ulusal Toplantısı, TOK, 2016.
  • Ayav, T., Sözer, H., “Moving Switching Functions to Continuous Domain,” Workshop on Model-based Verification and Validation, MVV, 2016.
  • Tos, U., Mokadem, R., Hameurlain, A., Ayav, T., Bora S., “A Performance and Profit Oriented Data Replication Strategy for Cloud Systems,” The IEEE International Conference on Cloud and Big Data Computing, CBDCom, 2016.
  • Abuzayed, N., Ergenç Bostanoğlu, B., “Dynamic Itemset Mining under Multiple Support Thresholds,” Fuzzy Systems and Data Mining II, IOS Press, 2016.
  • Oğuz, D., Yin, S., Hameurlain, A., Ergenç Bostanoğlu, B., Dikenelli, O., “Adaptive Join Operators for Federated Queries over Linked Data Endpoints,” European Conference on Advances in Databases and Information Systems, ADBIS, 2016.
  • Darrab, S., Ergenç Bostanoğlu, B., “Frequent Pattern Mining under Multiple Support Thresholds,” Wseas Transactions on Computer Research, 4, 2016.
  • Ufuktepe, E., Tuğlular, T., “Automation Architecture for Bayesian Network Based Test Case Prioritization and Execution,” IEEE International Workshop on Software Testing Automation (STA) in conjunction with International Conference on Conference on Computer, Software and Applications (COMPSAC), 2016.
  • Belli, F., “Dependable Reuse of Software Components and Systems,” IZTECH Workshop on Dependability, 2016.
  • Belli, F., Linschulte, M., Tuğlular, T., “Karar tablosu destekli olay sıra çizgeleri temelli sınama durum üretim aracı – Decision Table-Supported Tool for Test Case Generation Based on Event Sequence Graphs,” Turkish National Conference on Software Engineering, 2016.
  • Kavzak, D., Ayav, T., Belli, F., “Neden-sonuç çizgelerinden test girişlerinin oluşturulması – Test Case Generation Based on Cause - Effect Graphs,” Turkish National Conference on Software Engineering, 2016.
  • Jemni, Ben, Ayed, L., Belli, F., Ben, Younes, A., Bendaly, Hlaoui, Y., “Message from the MVDA 2016 Workshop Organizers,” Computer Software and Applications Conference, COMPSAC, 2016.
  • Belli, F., “Dependable Reuse of Software and Hardware Components - A Holistic View,” International Conference on sustainable Development, ICSD, 2016.
  • Belli, F., Subramanyan, R., “Message from the STA 2016 Workshop Organizers,” Computer Software and Applications Conference, COMPSAC, 2016.
  • Belli, F., “Model-Based Testing of Reusable Software Components and Systems,” IEEE International Workshop on Model-Based Verification & Validation, MVV, 2016.
  • Erdoğmuş, N., Özuysal, M., “Anahtar Noktalar Kullanarak Manzara Metni Tespiti – Scene Text Localization Using Keypoints," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2015.
  • Karaimer, H.C., Baştanlar, Y., "Zamanda Ortalaması Alınmış İkili Önplan İmgeleri Kullanarak Taşıt Sınıflandırması - Classification of Vehicles Using Binary Foreground Images Averaged Over Time," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2015.
  • Karaimer, H.C., Baştanlar, Y., "Detection and Classification of Vehicles from Omnidirectional Videos using Temporal Average of Silhouettes," International Conference on Computer Vision Theory and Applications, VISAPP, 2015.
  • Karaimer, H.C., Çınaroğlu, İ., Baştanlar, Y., "Combining shape-based and gradient-based classifiers for vehicle classification," IEEE International Transportation Systems Conference, ITSC, 2015.
  • Uzyıldırım, F. E., Köksal, A., Özuysal, M., "MSER ve FAST Tekrarlanabilirliğinin Detaylı bir Analizi - A Detailed Analysis of MSER and FAST Repeatibility," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2015.
  • Türkmen, S., Yalın, H., Tekir, S. "Bir Platform Oyununa Kullanıcı Performansı Temelinde Yapay Zeka Uyarlaması," Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2015.
  • Ayav, T., “Yazılım Yapısal Kapsama Analizinde Testlerin Önceliklendirilmesi,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2015.
  • Ayav, T., “Birleşimsel Devreler için Otomatik Test Örüntüsü Oluşturma,” IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2015.
  • Ayav, T., Belli, F., “Boolean Differentiation for Formalizing Myers' Cause-Effect Graph Testing Technique,” Workshop on Model-based Verification and Validation, MVV, 2015.
  • Ayav, T., Tuğlular, T., Belli, F., “Model Based Testing of VHDL Programs,” IEEE International Workshop on Software Test Automation, STA, 2015.
  • Takan, S., Güler, B., Ayav, T., “Model Checker-Based Delay Fault Testing of Sequential Circuits,” Workshop on Dependability and Fault Tolerance, VERFE 2015.
  • Ufuktepe, E., Tuğlular, T., “JavaScript Kütüphaneleri için Girdi Doğrulama Analizi - Input Validation Analysis of JavaScript Libraries,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2015.
  • Belli, F., “Regular Expressions for Fault Handling in Sequential Circuits,” International Conference on Architecture of Computing Systems, ARCS, Workshop on Dependability and Fault Tolerance, VERFE, 2015.
  • Erdoğmuş, N., Vanoni, M., Marcel, S., “Within- and Cross- Database Evaluations for Gender Classification via BeFIT Protocols,” International Workshop on Multimedia Signal Processing, MMSP 2014.
  • Karaimer, H.C., Baştanlar, Y., "Haar-Benzeri Öznitelikler ve Basamaklı Hızlandırma Kullanarak Tümyönlü Kameralar ile Binek Araç Tespiti - Car Detection with Omnidirectional Cameras Using Haar-Like Features and Cascaded Boosting," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2014.
  • Çınaroglu, İ., Baştanlar, Y., "A Direct Approach for Human Detection with Catadioptric Omnidirectional Cameras," IEEE Sinyal İşleme ve İletişim Uygulamaları Kurultayı, SIU, 2014.
  • Leloğlu, E., Ayav, T., Ergenç, B., “Coefficient-Based Exact Approach for Frequent Itemset Hiding,” International Conference on Information, Process, and Knowledge Management, eKNOW, 2014.
  • Ufuktepe, E., Tuğlular, T., “JavaScript Kütüphanelerinin Güvenilir Olmayan Verilere Karşı Hazır Olma Durumlarının Bayesian Ağları ile Ölçülmesi - Readiness Measurement of JavaScript Libraries to Untrusted Data using Bayesian Networks,” Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, ISC, 2014.
  • Tuğlular, T., Şentuna, N., Tuğ, A.K., Dağhan, G., Güven, C., “Lojistik Merkez Konteyner Terminal Yönetimi Yazılımı için Alana Özgü Dil Geliştirimi ve Kullanımı - Domain Specific Language Development and Usage for Container Logistics Terminal Management,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2014.
  • Tuğlular, T., Tekir, S., Velibeyoğlu, K., "Mapping Information and Communication Sector in Izmir: Exploring Clustering Potential," Knowledge Cities World Summit, KCWS, 2013.
  • Leloğlu, E., Ayav, T., Aslan, B., “A review of cloud deployment models for e-learning systems,” IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, 2013.
  • Şahin, S., “On Current Trends in Security and Privacy of Cloud Computing,” International Conference on Application of Information and Communication Technologies, AICT, 2013.
  • Leloğlu, E., Ayav, T., Aslan, B.G., “A review of cloud deployment models for e-learning systems,” IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, 2013.
  • Tekir, S., "Overt Information Operations During Peacetime," European Conference on Information Warfare and Security, ECIW, 2012.
  • Aslanoğlu, R., Tekir, S., "Recent Cyberwar Spectrum and its Analysis," European Conference on Information Warfare and Security, ECIW, 2012.
  • Oğuz, D., Ergenç Bostanoğlu, B., “Incremental Itemset Mining Based on Matrix Apriori,” International Conference on Data Warehousing and Knowledge Discovery, DEXA-DaWaK, 2012.
  • Assefa, B. G., Ergenç Bostanoğlu, B., “OrderBased Labeling Scheme for XML Query Processing,” International Cross-Domain Conference, CD-ARES, 2012.
  • Tekir, S., Mansmann, F., Keim, D., "Geodesic distances for web document clusterin," IEEE Symposium on Computational Intelligence and Data Mining, CIDM, 2011.
  • Tos, U., Ayav, T., “Adaptive RTP Rate Control Method,” Proceedings of COMPSAC, 2011.
  • Yıldız, B., Ergenç Bostanoğlu, B., “Hiding Sensitive Predictive Frequent Itemsets,” International MultiConference of Engineers and Computer Scientists, IMECS, 2011.
  • Tuğlular, T., Gerçek, G., “Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing,” IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI, 2011.
  • Alioğlu, M., Göğebakan, U., Şahin, S., “Prime Numbers for Secure Cryptosystems and Primality Testing on MultiCore Architectures,” International Symposium on Computing in Science & Engineering, 2011.
  • Yıldız, E., Şahin, S., “Security Risks of Cloud Computing and Precautions,” Izmir International Informatics Law Congress, 2011.
  • Toker, A., Ayav, T., “Design of a Secure Microprocessor,” International Security and Criptology Conference, ISC, 2010.
  • Ayav, T., Tuğlular, T., Belli, F., “Towards Test Case Generation for Synthesizable VHDL Programs Using Model Checker,” Workshop on Model-based Verification and Validation, MVV, 2010.
  • Yıldız, B., Ergenç Bostanoğlu, B., “Comparison of Two Association Rule Mining Algorithms without Candidate Generation,” IASTED International Conference on Artificial Intelligence and Applications, AIA, 2010.
  • Tuğlular, T., Gerçek, G., Tos, U., “İnternet Üzerinde Özellik Tabanlı Şifreleme Kullanan Bir Dosya Saklama Ortamı Önerisi - A Proposal for Internet-based File Storage Environment using Attribute-based Encryption,” Türkiye'de İnternet Konferansı, INET-TR, 2010.
  • Tuğlular, T., Gerçek, G., “Feedback Control Based Test Case Instantiation For Firewall Testing,” IEEE International Workshop on Software Cybernetics (IWSC) in conjunction with International Conference on Conference on Computer, Software and Applications (COMPSAC), 2010.
  • Türkmendağ, Ç., Yağcan, İ., Tuğlular, T., “Firewall Policy Visualization with Respect to Port-Based Vulnerabilities,” Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı, ISC, 2010.
  • Gerçek, G., Yarımtepe, O., Tuğlular, T., “A Flow-based Network Traffic Characterization Tool,” Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı, ISC, 2010.
  • Tekbacak, F., Tuğlular, T., Dikenelli, O., “Normatif Çoklu Etmen Sistemlerinde Rol Tabanlı Etmenler İçin Politika Tabanlı Bir Erişim Denetimi Yaklaşımı - Policy-based Access Control Approach for Role-based Agents in Normative Multi-Agent Systems,” Akademik Bilişim Konferansı, AB, 2010.
  • Aycan, E., Ayav, T., “Solving the Course Scheduling Problem Using Simulated Annealing,” IEEE International Advance Computing Conference, IACC, 2009.
  • Yıldız, B., Özdemir, S., Ergenç Bostanoğlu, B., “Doğal Sistemlerin Güç Kanunu Davranışı,” Ulusal Makine Teorisi Sempozyumu, UMTS, 2009.
  • Tekbacak, F., Tuğlular, T., Dikenelli, O., “An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies,” IEEE International Workshop on Engineering Semantic Agent Systems (ESAS) in conjunction with International Conference on Conference on Computer, Software and Applications (COMPSAC), 2009.
  • Atman, N., İnceoğlu, M.M., Aslan, B.G., “Learning styles diagnosis based on learner behaviors in web based learning,” International Conference on Computational Science and Its Applications, ICCSA, 2009.
  • Atman, N., İnceoğlu, M.M., Öğretmen, T., Aslan, B.G., “Felder ve Soloman Öğrenme Biçemi Ölçeği etkin-yansıtıcı ve görsel-sözel boyutlarının geçerlik ve güvenirlik çalışması-Validity and reliability study of visual-verbal dimensions of ILS,” First International Congress on Turkish Educational Studies, 2009.
  • Tuğlular, T., Belli, F., “Protocol-Based Testing of Firewalls,” South-East European Workshop on Formal Methods, SEEFM, 2009.
  • Tuğlular, T., Müftüoğlu, C.A., Belli, F., Linschulte, M., “Event-Based Input Validation Using Design-by-Contract Patterns,” International Symposium on Software Reliability Engineering, ISSRE, 2009.
  • Tuğlular, T., Müftüoğlu, C.A., Kaya, Ö., Belli, F., Linschulte, M., “GUI Based Testing of Boundary Overflow Vulnerability,” IEEE International Workshop on Software Testing Automation (STA) in conjunction with International Conference on Conference on Computer, Software and Applications (COMPSAC), 2009.
  • Tuğlular, T., Belli, F., “Directed Acyclic Graph Modeling of Security Policies for Firewall Testing,” International Workshop on Model-Based Verification & Validation (MVV ) in conjunction with IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI), 2009.
  • Toker, A., Ayav, T., “FPGA ile Gerçeklenen Devrelerde Hataya Dayanıklılık - Fault-Tolerance in FPGA Implementations,” Otomatik Kontrol Ulusal Toplantısı, TOK, 2008.
  • Ayav, T., Harsa, N., Toker, K.A., Aksakallı, G., “CryptOdin:16-bit Secure Microprocessor,” Gömülü Sistemler ve Uygulamaları Sempozyumu, GÖMSİS 2008.
  • Tekbacak, F., Tuğlular, T., Dikenelli, O., “Çoklu Etmen Sistemlerinde Rol Tabanlı Erişim Denetimi için Bir Yaklaşım Önerisi - A Proposal for Role-based Access Control in Multi-Agent Systems,” Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı (ISC), 2008.
  • Tuğlular, T., Çetin, F., Yarımtepe, O., Gerçek, G., “Firewall Configuration Management Using XACML Policies,” International Telecommunications Network Strategy and Planning Symposium, Networks, 2008.
  • Tekbacak, F., Tuğlular, T., Dikenelli, O., “A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT,” International Conference on Software Engineering and Knowledge Engineering, SEKE, 2008.
  • Tuğlular, T., “Monitoring of Policy Operations in a Distributed Firewall Environment,” International Symposium On Computer Networks, ISCN, 2008.
  • Tuğlular, T., “Automatic Enforcement of Location Aware User Based Network Access Control Policies,” WSEAS International Conference on TELECOMMUNICATIONS and INFORMATICS, TELE-INFO, 2008.
  • Tuğlular, T., Gürcan, G., Samanlı, E., “Merkezi Dosya Saklama Ortamları için Erişim Denetimli Kriptografik Bir Güvenlik Mimarisi - Access Control and Cryptography-based Security Architecture for Central File Storage Environments,” Ağ ve Bilgi Güvenliği Ulusal Sempozyumu, ABG, 2008.
  • Çetin, F., Yarımtepe, O., Tuğlular, T., “Güvenlik Duvarları için Politika Anomali Belirleme Algoritmasının Deneysel Uygulaması - Experimental Evaluation of Policy Anomaly Detection Algorithm to Firewalls,” Akademik Bilişim Konferansı, AB, 2008.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Kurumsal Web Güvenliği Yapısı - Enterprise Web Security Architecture,” Akademik Bilişim Konferansı, AB, 2008.
  • Atay, S., Massera, M., “Security of Critical Information Infrastructures E-Governance and Standardization,” Information Security & Cryptology Conference with International Participation, ISCTurkey, 2008.
  • Ergenç Bostanoğlu, B., Morvan, F., Hameurlain, A., “Robust Placement of Mobile Relational Operators for Large Scale Distributed Query Optimization,” International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT, 2007.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Enterprise-wide Web Security Infrastructure,” TERENA Networking Conference, TNC, 2007.
  • Tuğlular, T., “Test Case Generation for Firewall Implementation Testing using Software Testing Techniques,” International Conference on Security of Information and Networks, SIN, 2007.
  • Atay, S., “The Performance Results of ECDSA Implementation on Different Coordinate Systems,” International Conference on Security of Information and Networks, SIN, 2007.
  • Aslan, B.G., İnceoğlu, M.M., “Machine learning based learner modeling for adaptive web-based learning,” International Conference on Computational Science and Its Applications, ICCSA, 2007.
  • Aslan, B.G., İnceoğlu, M.M., “A comparative study on neural network based soccer result prediction,” Intelligent Systems Design and Applications, ISDA, 2007.
  • İnceoğlu, M.M., Aslan, B.G., “Computational sciences learning project for pre-university students,” International Conference on Computational Science, ICCS, 2007.
  • Koltuksuz, A., Tekir, S., "Intelligence Analysis Modeling," International Conference on Hybrid Information Technology, ICHIT, 2006.
  • Tekir, S., Eren, S., "Information Organization in the Business World," IMDA World Business Congress, 2006.
  • Kurtel, K., Tekir, S., Atay, S., "Lojistik Merkezi Güvenlik Gereksinimleri, XML ve Sayısal İmza," Ulusal Elektronik İmza Sempozyumu, 2006.
  • Ayav, T., Fradet, P., Girault, A., “Implementing Fault-Tolerance in Real-Time Systems by Automatic Program Transformations,” International Conference on Embedded Software, EMSOFT, 2006.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Does Network Awareness Make Difference In Intrusion Detection of Web Attacks,” International Conference on Hybrid Information Technology, ICHIT, 2006.
  • Kayayurt, B., Tuğlular, T., “End-to-end security implementation for mobile devices using TLS protocol,” Annual EICAR Conference, 2006.
  • Atay, S., Koltuksuz, A., Hisil, H., Eren, S., “Computational cost analysis of elliptic curve arithmetic,” International Conference on Hybrid Information Technology, ICHIT, 2006.
  • Kurtel, K., Atay, S., Tunçay, A., “Information Technologies For Contemporary Logistics Centers,” International Logistics and Supply Chain Congress, The Era of Collaboration Through Supply Chain Networks, 2006.
  • Atay, S., Kurtel, K., Eren, Ş., Koltuksuz, A., “Security Issues of the Supply Chain Management with Web Services,” World Business Congress International Management Development Association / International Management Development Reserach Yearbook, IMDA, 2006.
  • Tekir, S., "Open Source Exploitation in Producing Intelligence," International Symposium on Information Technology, ISIT, 2005.
  • Tekir, S., Koltuksuz, A., "Bilgi Sistemleri Bilim ve Teknolojisine Dayali Acik Kaynak Istihbarati ve Bir Uygulama Modeli," Polis Bilişim Sempozyumu, 2005.
  • Koltuksuz, A., Atay, S., Tapucu, D., Tekir, S., Demiray, O., Asarcıklı, S., Hışıl, H., "Bilgi Sistemleri Güvenliği Dersi," Akademik Bilişim, 2005.
  • Asarcıklı, Ş., Tuğlular, T., “Monitoring Firewall Using Intrusion Detection Systems,” International Symposium On Information Technologies, ISIT, 2005.
  • Demiray, S., Tuğlular, T., “Improving Neural Networks Based Intrusion Detection Through Constant Extension of Training Dataset with New Attacks,” International Symposium On Information Technologies, ISIT, 2005.
  • Atay, S., “Protocols For Elliptic Curve Cryptography,” International Symposium on Information Technologies, ISIT, 2005.
  • Atay, S., “Elliptic Curve Cryptography and An Implementation on Smart Cards,” Network and Information Security Symposium organized by ITU and EMO, 2005.
  • Atay, S., “Certification of IT Security Personnel,” Akademik Bilişim Konferansı, AB, 2005.
  • Ayav, T, Ferrari-Trecate, G., Yılmaz, S., “Stability Properties of Adaptive Real-Time Feedback Scheduling: A Statistical Approach,” Real-Time Embedded Systems Conference, 2004.
  • Semerci, H., Tuğlular, T., “Intrusion Prevention Systems: Could They Be Synergy Point of Current Network Security Solutions?,” Annual EICAR Conference, 2004.
  • Karaarslan, E., Tuğlular, T., Şengonca, H., “Enterprise Wide Web Application Security: An Introduction,” Annual EICAR Conference, 2004.
  • Atay, S., “Digital Signature and Applications,” Compotek Informatics Symposium, 2004.
  • Altıntaş, E., Özardıç, O., Talay, S., Ayav, T., “Bir Ağ Yönetim Sistemi: Guardilan - A Network Management system: Guardilan,” Proceedings of TBD 20th Informatics Workshop, 2003.
  • Urgancıoğlu, K., Ergenç Bostanoğlu, B., “Ontoloji Odaklı Arama Sistemi,” inet-tr, 2003.
  • Şahin, G., Ergenç Bostanoğlu, B., “PAGERANKER (Web Sayfalarına Değer Atama),” TBD Bilişim Kurultayı, 2003.
  • Belen, E., Özgür, Ç., Ergenç Bostanoğlu, B., “WALA (Web Kütük Analisti),” TBD Bilişim Kurultayı, 2003.
  • Tuğlular, T., Algan, F., Hışıl, H., Akdemir, O., Altay, O., Örer, Y., “Üniversite Ortamında Yazılım Geliştirme Deneyimleri - Software Development Experiences in University Environment,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2003.
  • Algan, F., Tuğlular, T., Dikenelli, O., “Test Yönelimli Yazılım Geliştirme Metotlarının J2EE Platformu ve Bileşen Modellerine Uygulanması Üzerine Bir Çalışma - Application of Test-driven Software Development Methods to J2EE Platform and Component Models,” Ulusal Yazılım Mühendisliği Sempozyumu, UYMS, 2003.
  • Tuğlular, T., Çağrıcı, G., “Construction of A Simple Intrusion Detection System For Alert Correlation Using Freeware Components,” Annual EICAR Conference, 2003.
  • Atay, S., “Information Security for Mobile Environments and Smart Cards,” Compotek Informatics Symposium, 2003.
  • Çağrıcı, G., Ayav, T., “IYTE Yerel Ağı için bir QoS Uygulaması - A QOS Application for IZTECH LAN,” Proceedings of TBD 19th Informatics Workshop, 2002.
  • Ergenç Bostanoğlu, B., Püskülcü, H., “Veritabanı Yaklaşımlı Genel Web Kullanım Madenciliği Sistemi,” TBD 19. Bilişim Kurultayı, 2002.
  • Tuğlular, T., Atay, S., “Cepte Taşınabilir Konferans Çantası - Conference Kit in the Pocket,” Kablosuz Ağlar ve Güvenlik Sempozyumu, WINS, 2002.
  • Tuğlular, T., “Bilgisayar Güvenliği Politikası Değerlendirme Kriterleri - Computer Security Policy Evaluation Criteria,” Türkiye Bilişim Derneği Ulusal Bilişim Kurultayı, 2002.
  • Tuğlular, T., “A Usage Based Computer Security Policy Generator,” Annual EICAR Conference, 2002.
  • Tuğlular, T., “Kablosuz Ağlar İçin Güvenlik Önlemleri - Security Precutions for Wireless Networks,” Kablosuz Ağlar ve Güvenlik Sempozyumu, WINS, 2001.
  • Tuğlular, T., “Functional Requirements Of An Intrusion Management Model,” International Symposium on Computer and Information Sciences, ISCIS, 2001.
  • Tuğlular, T., “Ateş Duvarı ve Nüfuz Tespit Sistemi İnternet'te Güvenlik İçin Yeterli Mi? - Are Firewalls and Intrusion Detection Systems Sufficient for Security on Internet?,” Türkiye'de İnternet Konferansı, INET-TR, 2001.
  • Tuğlular, T., “Nüfuz Yönetim Politikaları - Policies for Intrusion Detection,” Türkiye Bilişim Derneği Ulusal Bilişim Kurultayı, 2001.
  • Tuğlular, T., “Management Practices Of Information Security Policies,” Annual EICAR Conference, 2001.
  • Ayav, T., Aytaç, S., “A New Embedded Controller for Data Acquisition and Control Applications,”, International Symposium on Computer and Information Sciences, 1999.

Tez

  • Aslan, B.G., “Heuristic Container Placement Algorithms,” M.S. Thesis, İzmir Institute of Technology, 2003.

Teknik Rapor

  • Ayav, T., Tuğlular, T., Belli, F., “Transforming VHDL to Timed Automata,” Technical Report, IYTE-COMPENG, 2015.