| Issue Date | Title | Author(s) |
1 | 2009 | The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing | Tuğlular, Tuğkan ; Kaya, Özgür; Müftüoğlu, Can Arda; Belli, Fevzi |
2 | 2009 | An architecture for verification of access control policies with multi agent system ontologies | Tekbacak, Fatih; Tuğlular, Tuğkan ; Dikenelli, Oğuz |
3 | 2008 | Automatic enforcement of location aware user based network access control policies | Tuğlular, Tuğkan |
4 | Aug-2006 | End-to-end security implementation for mobile devices using TLS protocol | Kayayurt, Barış; Tuğlular, Tuğkan |
5 | 2009 | Event-based input validation using design-by-contract patterns | Tuğlular, Tuğkan ; Müftüoğlu, Can Arda; Belli, Fevzi ; Linschulte, M. |
6 | 2008 | Firewall configuration management using XACML policies | Tuğlular, Tuğkan |
7 | 2009 | GUI-based testing of boundary overflow vulnerability | Tuğlular, Tuğkan ; Müftüoğlu, Can Arda; Kaya, Özgür; Belli, Fevzi ; Linschulte, M. |
8 | Jun-2008 | Location aware self-adapting firewall policies | Tuğlular, Tuğkan |
9 | 2008 | Monitoring of policy operations in a distributed firewall environment | Çakı, Oğuzhan; Tuğlular, Tuğkan ; Çetin, Füsun |
10 | 2009 | Protocol-based testing of firewalls | Tuğlular, Tuğkan ; Belli, Fevzi |
11 | 2008 | A semantic based certification and access control approach using security patterns on SEAGENT | Tekbacak, Fatih; Tuğlular, Tuğkan ; Dikenelli, Oğuz |
12 | 2008 | Test case generation for firewall implementation testing using software testing techniques | Tuğlular, Tuğkan |