Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 3 of 3
  • Conference Object
    Citation - Scopus: 2
    Repository Landscape in Turkiye and Gcris: the First National Research Information System
    (Elsevier, 2022) Tuğlular, Tuğkan; Gürdal, Gültekin; Kafalı Can, Gönül; Özdemirden, Ahmet Şemsettin
    This paper describes the history and developments of research infrastructures and open science policies in Turkiye. Moreover, it focuses on the GCRIS (Grand Current Research Information Systems), Turkiye's first Research Information System by inter-national standards, emphasizing the need for internationally interoperable research infrastructures in Turkiye. GCRIS Research Information System, implemented on the open-source software DSpace-CRIS 6.3, was developed with data analytics in mind and continues to be improved by Research Ecosystems Inc. As a strategic partner, Izmir Institute of Technology (IZTECH) is the first university to use GCRIS. Other Universities have used GCRIS since then. With the increase in the number of universities using GCRIS, Turkiye's Research Ecosystem will be trackable and measurable much better thanks to GCRIS intelligent reporting sys- tem. Most importantly, not only the research outputs of Turkiye will be more visible, but also research infrastructures' integration will facilitate with the European Open Science Cloud (EOSC) and other initiatives worldwide.
  • Article
    Citation - WoS: 6
    Citation - Scopus: 6
    Estimating Software Robustness in Relation To Input Validation Vulnerabilities Using Bayesian Networks
    (Springer Verlag, 2018) Ufuktepe, Ekincan; Tuğlular, Tuğkan
    Estimating the robustness of software in the presence of invalid inputs has long been a challenging task owing to the fact that developers usually fail to take the necessary action to validate inputs during the design and implementation of software. We propose a method for estimating the robustness of software in relation to input validation vulnerabilities using Bayesian networks. The proposed method runs on all program functions and/or methods. It calculates a robustness value using information on the existence of input validation code in the functions and utilizing common weakness scores of known input validation vulnerabilities. In the case study, ten well-known software libraries implemented in the JavaScript language, which are chosen because of their increasing popularity among software developers, are evaluated. Using our method, software development teams can track changes made to software to deal with invalid inputs.
  • Conference Object
    Citation - Scopus: 9
    Event-Based Input Validation Using Design-By Patterns
    (Institute of Electrical and Electronics Engineers Inc., 2009) Tuğlular, Tuğkan; Müftüoğlu, Can Arda; Belli, Fevzi; Linschulte, M.
    This paper proposes an approach for validation of numerical inputs based on graphical user interfaces (GUI) that are modeled and specified by event sequence graphs (ESG). For considering complex structures of input data, ESGs are augmented by decision tables and patterns of design by contract (DbC). The approach is evaluated by experiments on boundary overflows, which occur when input values violate the range of specified values. Furthermore, a tool is presented that implements our approach enabling a semiautomatically detection of boundary overflow errors and suggesting correction steps based on DbC.