Tuğlular, Tuğkan

Loading...
Name Variants
Tuğlular, T
Tuğlular, T.
Tuglular, Tugkan
Tuglular, T.
Tuglular, T
Job Title
Email Address
tugkantuglular@iyte.edu.tr
tugkantuglular@gmail.com
Main Affiliation
03.04. Department of Computer Engineering
Status
Current Staff
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

NO POVERTY1
NO POVERTY
0
Research Products
ZERO HUNGER2
ZERO HUNGER
0
Research Products
GOOD HEALTH AND WELL-BEING3
GOOD HEALTH AND WELL-BEING
0
Research Products
QUALITY EDUCATION4
QUALITY EDUCATION
7
Research Products
GENDER EQUALITY5
GENDER EQUALITY
0
Research Products
CLEAN WATER AND SANITATION6
CLEAN WATER AND SANITATION
0
Research Products
AFFORDABLE AND CLEAN ENERGY7
AFFORDABLE AND CLEAN ENERGY
0
Research Products
DECENT WORK AND ECONOMIC GROWTH8
DECENT WORK AND ECONOMIC GROWTH
3
Research Products
INDUSTRY, INNOVATION AND INFRASTRUCTURE9
INDUSTRY, INNOVATION AND INFRASTRUCTURE
38
Research Products
REDUCED INEQUALITIES10
REDUCED INEQUALITIES
0
Research Products
SUSTAINABLE CITIES AND COMMUNITIES11
SUSTAINABLE CITIES AND COMMUNITIES
2
Research Products
RESPONSIBLE CONSUMPTION AND PRODUCTION12
RESPONSIBLE CONSUMPTION AND PRODUCTION
1
Research Products
CLIMATE ACTION13
CLIMATE ACTION
0
Research Products
LIFE BELOW WATER14
LIFE BELOW WATER
0
Research Products
LIFE ON LAND15
LIFE ON LAND
0
Research Products
PEACE, JUSTICE AND STRONG INSTITUTIONS16
PEACE, JUSTICE AND STRONG INSTITUTIONS
1
Research Products
PARTNERSHIPS FOR THE GOALS17
PARTNERSHIPS FOR THE GOALS
0
Research Products
Documents

59

Citations

257

h-index

8

Documents

36

Citations

142

Scholarly Output

110

Articles

21

Views / Downloads

159228/41148

Supervised MSc Theses

36

Supervised PhD Theses

2

WoS Citation Count

146

Scopus Citation Count

242

Patents

1

Projects

2

WoS Citations per Publication

1.33

Scopus Citations per Publication

2.20

Open Access Source

94

Supervised Theses

38

JournalCount
International Journal of Software Engineering and Knowledge Engineering4
IEEE Access4
Dokuz Eylül Üniversitesi Mühendislik Fakültesi Fen ve Mühendislik Dergisi3
33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 20092
European Journal of Human Genetics2
Current Page: 1 / 11

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 110
  • Master Thesis
    Anomaly Detection Using Network Traffic Characterization
    (Izmir Institute of Technology, 2009) Yarımtepe, Oğuz; Tuğlular, Tuğkan; Tuğlular, Tuğkan
    Detecting suspicious traffic and anomaly sources are a general tendency about approaching the traffic analyzing. Since the necessity of detecting anomalies, different approaches are developed with their software candidates. Either event based or signature based anomaly detection mechanism can be applied to analyze network traffic. Signature based approaches require the detected signatures of the past anomalies though event based approaches propose a more flexible approach that is defining application level abnormal anomalies is possible. Both approach focus on the implementing and defining abnormal traffic. The problem about anomaly is that there is not a common definition of anomaly for all protocols or malicious attacks. In this thesis it is aimed to define the non-malicious traffic and extract it, so that the rest is marked as suspicious traffic for further traffic. To achieve this approach, a method and its software application to identify IP sessions, based on statistical metrics of the packet flows are presented. An adaptive network flow knowledge-base is derived. The knowledge-base is constructed using calculated flows attributes. A method to define known traffic is displayed by using the derived flow attributes. By using the attributes, analyzed flow is categorized as a known application level protocol. It is also explained a mathematical model to analyze the undefined traffic to display network traffic anomalies. The mathematical model is based on principle component analysis which is applied on the origindestination pair flows. By using metric based traffic characterization and principle component analysis it is observed that network traffic can be analyzed and some anomalies can be detected.
  • Master Thesis
    Development of a Machine Learning Platform for Analysis of Mitochondrial Features in Live-Cell Images
    (01. Izmir Institute of Technology, 2022) Tarkan, Yalçın; Tuğlular, Tuğkan; Tuğlular, Tuğkan
    It is a laborious and error-prone manual process to mark the organelles in 2D and 3D images of living cells and identify the behavioral feedback to stimulations under measured conditions. This manual process can be simplified by being largely automated with machine learning techniques. We created a machine learning-based software platform named MitoML, which extracts sub-cellular structures, specifically mitochondria, and helps to identify the effects of external factors or changes under natural conditions. We investigate appropriate machine learning techniques for these objectives. Image processing and segmentation techniques with neural networks, enable researchers to carry out experiments with much better accuracy and a larger scale by automatically segmenting and counting the mitochondria, calculate the energy potentials based on region brightness. This way, analysis of mitochondria feedback in healthy and cancer cells under various conditions, such as nanomedicine and different treatment therapies, can be performed using MitoML. As a result of our work, we proposed a cascaded neural network architecture that can identify and count mitochondria, quantify its energy levels in fluorescence and other microscopy images, fast and at a standard reliable accuracy. Our test results outperformed the classical image processing algorithms provided in segmentation tools and software for medical image segmentation which was taken as a base line. Achieved accuracy rates 93.4% and %89.6 according to Dice and IoU metrics respectively are also better than any other related work encountered during the research. The proposed method can be improved to cover other sub-cellular structures relieving the researchers from non-standardized and laborious manual work which is prone to human error.
  • Conference Object
    Citation - Scopus: 1
    Mutation Analysis of Specification-Based Contracts in Software Testing [conference Object]
    (IEEE, 2021) Khalilov, Abbas; Tuğlular, Tuğkan; Belli, Fevzi
    This work focuses on checking the adequacy of the test cases generated using Decision-Table-augmented Event Sequence Graphs (ESG-DTs), which represents the specification of a system under test, by using mutation analysis. Test cases are represented in the Complete Event Sequence (CES) and Faulty CES (FCES) forms. We present a new set of mutation operators for mutation of contracts represented in Multi-Terminal Binary Decision Diagram (MTBDD) and introduce a new approach to mutation of the ESG-DT model by using the proposed mutation operators. The approach is evaluated on three cases. The results show the drawback of specific FCES test sequences and the relationship between the mutant detection by CES/FCES sequences and proposed mutation operators.
  • Master Thesis
    Development of Co-Evolution Tracker Tool for Software With Acceptance Criteria
    (Izmir Institute of Technology, 2022) Yalçın, Ali Görkem; Tuğlular, Tuğkan; Tuğlular, Tuğkan
    Testing is a vital part of achieving good-quality software. Deploying untested code can cause system crashes and unexpected behavior. In order to reduce these problems, testing must be prioritized. However, once test suites are created, they should not remain static throughout the software updates. Since whenever software gets updated, new functionalities are added or existing functionalities are changed, so whenever the application is updated, test suites must be updated along with the software. If the old test suites are used with the new updates, unexpected testing results can occur. In order to repair test cases in the process of software evolution, analyzing real-world projects’ software and test case evolution is an important prerequisite. Software repositories contain valuable information about the software systems. Having access to older versions and by differentiating adjacent versions’ test and production code changes can provide information about the evolution process of the software. This thesis concentrates on the development of a tool that is used for the analysis of 21 real-world projects in the terms of co-evolution of both software and its test suites. Related projects are retrieved from repositories and filtered according to this study’s needs, then for each project's every update is analyzed, and graphs and analysis related to the co-evolution process are created.
  • Conference Object
    Citation - WoS: 3
    Citation - Scopus: 6
    Spl-At Gherkin: a Gherkin Extension for Feature Oriented Testing of Software Product Lines
    (IEEE, 2019) Tuğlular, Tuğkan; Şensülün, Secan
    As cloud platforms turn into software product lines (SPLs), testing products composed of customer selected features becomes more and more important. In this paper, we propose a feature-oriented testing approach for platform-based SPLs through a novel extension to Gherkin called SPL-AT Gherkin and a novel automatic test method generation technique, which utilizes TestNG framework. We demonstrate the applicability of the proposed approach by a case study.
  • Master Thesis
    Standards and Practices Necessary To Implement a Successful Security Review Program for Intrusion Management Systems
    (Izmir Institute of Technology, 2002) Doruk, Alpay; Tuğlular, Tuğkan; Tuğlular, Tuğkan
    Intrusion Management Systems are being used to prevent the information systems from successful intrusions and their consequences. They also have detection features. They try to detect intrusions, which have passed the implemented measures. Also the recovery of the system after a successful intrusion is made by the Intrusion Management Systems. The investigation of the intrusion is made by Intrusion Management Systems also. These functions can be existent in an intrusion management system model, which has a four layers architecture. The layers of the model are avoidance, assurance, detection and recovery. At the avoidance layer necessary policies, standards and practices are implemented to prevent the information system from successful intrusions. At the avoidance layer, the effectiveness of implemented measures are measured by some test and reviews. At the detection layer the identification of an intrusion or intrusion attempt is made in the real time. The recovery layer is responsible from restoring the information system after a successful intrusion. It has also functions to investigate the intrusion. Intrusion Management Systems are used to protect information and computer assets from intrusions. An organization aiming to protect its assets must use such a system. After the implementation of the system, continuous reviews must be conducted in order to ensure the effectiveness of the measures taken. Such a review can achieve its goal by using principles and standards. In this thesis, the principles necessary to implement a successful review program for Intrusion Management Systems have been developed in the guidance of Generally Accepted System Security Principles (GASSP). These example principles are developed for tools of each Intrusion Management System layer. These tools are firewalls for avoidance layer, vulnerability scanners for assurance layer, intrusion detection systems for detection layer and integrity checkers for recovery layer of Intrusion Management Systems.
  • Article
    Citation - WoS: 3
    Citation - Scopus: 3
    Model-Based Contract Testing of Graphical User Interfaces
    (Institute of Electronics, Information and Communication Engineers, 2015) Tuğlular, Tuğkan; Linschulte, Michael; Belli, Fevzi; Müftüoğlu, Arda
    Graphical User Interfaces (GUIs) are critical for the security, safety and reliability of software systems. Injection attacks, for instance via SQL, succeed due to insufficient input validation and can be avoided if contract-based approaches, such as Design by Contract, are followed in the software development lifecycle of GUIs. This paper proposes a model-based testing approach for detecting GUI data contract violations, which may result in serious failures such as system crash. A contract-based model of GUI data specifications is used to develop test scenarios and to serve as test oracle. The technique introduced uses multi terminal binary decision diagrams, which are designed as an integral part of decision tableaugmented event sequence graphs, to implement a GUI testing process. A case study, which validates the presented approach on a port scanner written in Java programming language, is presented. Copyright © 2015 The Institute of Electronics, Information and Communication Engineers.
  • Editorial
    Message From the Symposium Chairs: Isssr 2022
    (IEEE, 2022) Wong, W. Eric; Wotawa, Franz; Zheng, Liwei; Tuğlular, Tuğkan
    Security, safety, and reliability are the three most important attributes of a system. This is especially the case for mission-critical and life-threatening systems. As the complexity of many systems continues to grow, ensuring security, safety, and reliability has become very critical. Not only does existing technology and tool support need to be enhanced, but we also need new strategies and approaches to satisfy more strict requirements on system security, safety, and reliability. In response to this challenge, the Steering Committee of ISSSR has decided to change its conference name from International Symposium on System and Software Reliability to International Symposium on System Security, Safety, and Reliability. The acronym ISSSR is still the same, but the full name has been slightly modified to emphasize the importance of security, safety, and reliability of many systems.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 6
    Incremental Testing in Software Product Lines-An Event Based Approach
    (IEEE, 2023) Beyazıt, Mutlu; Tuğlular, Tuğkan; Öztürk Kaya, Dilek
    One way of developing fast, effective, and high-quality software products is to reuse previously developed software components and products. In the case of a product family, the software product line (SPL) approach can make reuse more effective. The goal of SPLs is faster development of low-cost and high-quality software products. This paper proposes an incremental model-based approach to test products in SPLs. The proposed approach utilizes event-based behavioral models of the SPL features. It reuses existing event-based feature models and event-based product models along with their test cases to generate test cases for each new product developed by adding a new feature to an existing product. Newly introduced featured event sequence graphs (FESGs) are used for behavioral feature and product modeling; thus, generated test cases are event sequences. The paper presents evaluations with three software product lines to validate the approach and analyze its characteristics by comparing it to the state-of-the-art ESG-based testing approach. Results show that the proposed incremental testing approach highly reuses the existing test sets as intended. Also, it is superior to the state-of-the-art approach in terms of fault detection effectiveness and test generation effort but inferior in terms of test set size and test execution effort.
  • Master Thesis
    Traffic Generator for Firewall Testing
    (Izmir Institute of Technology, 2009) Kaya, Özgür; Tuğlular, Tuğkan
    Firewalls lead at the front line of a computer network to restrict unauthorized access. The desired security level is determined by a policy and implemented by a firewall which not only has to be effective but also stable and reliable service is expected. In order to verify the level of security of the system, testing is required. The objective of this thesis is to test a firewall with software testing techniques taking into consideration the nominated policy and the firewall. Iptables software was examined and tested by two different algorithms that were modified according to software testing techniques, and the results were observed. Packets sent through the Firewall Under Test (FUT) are compared to packets passed through the FUT and test results were observed. The security performance of the modified algorithms proved to be successful.