Search Results - "Bekiroğlu, Berk"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Survivability Analysis of K-Variant Architecture for Different Memory Attacks and Defense Strategies by Bekiroglu, Berk, Korel, Bogdan

    “…Many systems require high security during a limited operational timeframe. These systems can be exposed to many attacks that prevent tasks from being…”
    Get full text
    Journal Article
  2. 2

    Source Code Transformations for Improving Security of Time-bounded K-variant Systems by Bekiroglu, Berk, Korel, Bogdan

    Published in Information and software technology (01-09-2021)
    “…Source code transformation techniques can improve the security of systems against memory exploitation attacks. As such, the chance of exploitation of security…”
    Get full text
    Journal Article
  3. 3

    Analysis and Implementation of Software Test Case Design Techniques by Bekiroğlu, Berk

    Published 01-01-2011
    “…Software testing is a process of finding bugs in a system, and it is an essential part of the software development process. Although, software testing is still…”
    Get full text
    Dissertation
  4. 4

    Program Survivability Through K-Variant Architecture by Bekiroglu, Berk

    Published 01-01-2021
    “…Numerous software systems, particularly mission and safety-critical systems, require a high level of security during their execution. Enhancing software…”
    Get full text
    Dissertation