Follow
Tugkan Tuglular
Tugkan Tuglular
Associate Professor of Computer Engineering, Izmir Institute of Technology
Verified email at iyte.edu.tr - Homepage
Title
Cited by
Cited by
Year
Model-based mutation testing—approach and case studies
F Belli, CJ Budnik, A Hollmann, T Tuglular, WE Wong
Science of Computer Programming 120, 25-48, 2016
782016
A preliminary structural approach to insider computer misuse incidents
T Tuglular
1st European Anti-Malware Conference (EICAR 2000), 2000
242000
A framework for characterization of insider computer misuse
T Tuglular, EH Spafford
Unpublished paper, Purdue University, 1997
241997
End-to-end security implementation for mobile devices using TLS protocol
B Kayayurt, T Tuglular
Journal in Computer Virology 2, 87-97, 2006
232006
Test case generation for firewall implementation testing using software testing techniques
T Tuglular
Proceedings of the International Conference on Security of Inform. and …, 2008
202008
Input contract testing of graphical user interfaces
T Tuglular, F Belli, M Linschulte
International Journal of Software Engineering and Knowledge Engineering 26 …, 2016
172016
Security through human-factors and biometrics
S Bakshi, T Tuglular
Proceedings of the 6th International Conference on Security of Information …, 2013
162013
Directed acyclic graph modeling of security policies for firewall testing
T Tuglular, Ö Kaya, CA Müftüoglu, F Belli
2009 Third IEEE International Conference on Secure Software Integration and …, 2009
162009
Event-based input validation using design-by-contract patterns
T Tuglular, CA Muftuoglu, F Belli, M Linschulte
2009 20th International Symposium on Software Reliability Engineering, 195-204, 2009
152009
A program slicing-based bayesian network model for change impact analysis
E Ufuktepe, T Tuglular
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
122018
Advances in model-based testing of graphical user interfaces
F Belli, M Beyazıt, CJ Budnik, T Tuglular
Advances in Computers 107, 219-280, 2017
112017
A new approach to the specification of general computer security policies
I Krsul, E Spafford, T Tuglular
COAST Techical Report, 97-13, 1998
111998
Model based mutation testing of firewalls
T Tuglular, F Belli
Fast Abstracts of TAIC-PART Conference, 2008
102008
GUI-based testing of boundary overflow vulnerability
T Tuglular, CA Muftuoglu, O Kaya, F Belli, M Linschulte
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
92009
Rule-based automatic question generation using semantic role labeling
O Keklik, T Tuglular, S Tekir
IEICE TRANSACTIONS on Information and Systems 102 (7), 1362-1373, 2019
82019
Automation architecture for Bayesian network based test case prioritization and execution
E Ufuktepe, T Tuglular
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
82016
Does Network Awareness Make Difference In Intrusion Detection of Web Attacks
E Karaarslan, T Tuğlular, H Şengonca
Karaarslan, E., Tuglular, T., & Sengonca, H.(2006). Does Network Awareness …, 2006
82006
Featured event sequence graphs for model-based incremental testing of software product lines
T Tuglular, M Beyazıt, D Öztürk
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
72019
Estimating software robustness in relation to input validation vulnerabilities using Bayesian networks
E Ufuktepe, T Tuglular
Software Quality Journal 26, 455-489, 2018
72018
Protocol-based testing of firewalls
T Tuglular, F Belli
2009 Fourth South-East European Workshop on Formal Methods, 53-59, 2009
72009
The system can't perform the operation now. Try again later.
Articles 1–20