The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tugkan Tuglular: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Baris Kayayurt, Tugkan Tuglular
    End-to-end security implementation for mobile devices using TLS protocol. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2006, v:2, n:1, pp:87-97 [Journal]

  2. An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies. [Citation Graph (, )][DBLP]


  3. GUI-Based Testing of Boundary Overflow Vulnerability. [Citation Graph (, )][DBLP]


  4. Event-Based Input Validation Using Design-by-Contract Patterns. [Citation Graph (, )][DBLP]


  5. A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT. [Citation Graph (, )][DBLP]


  6. Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002